16.12.2015 Views

Strategic Use New Media Peaceful Social Change

1Uy7LZ0

1Uy7LZ0

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GUIDEBOOK FOR THE<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong><br />

for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

DALIA HAJ-OMAR<br />

a project by<br />

Sawtna<br />

.net


Copyright © 2015 by Dalia Haj-Omar<br />

This work is licensed under the Creative Commons Attribution-ShareAlike<br />

4.0 International License. To view a copy of this license, visit<br />

http://creativecommons.org/licenses/by-sa/4.0.<br />

ISBN 978-0-9838647-9-0<br />

Credits<br />

Photo credits<br />

Front cover: Bashir Hamid<br />

Chapter 1: <br />

Chapter 2: <br />

Chapter 3: <br />

Chapter 4:<br />

Chapter 5: <br />

Conclusion:<br />

Design and layout<br />

Plain Sense, Geneva<br />

cover – hajooj kuka<br />

page 14 – Amir Ahmad Nasr<br />

cover – hajooj kuka<br />

page 38 – hajooj kuka<br />

page 44 – Khalid Albaih<br />

page 50 – Olivier Laban-Mattei/AFP/Getty Images<br />

cover – hajooj kuka<br />

page 65 – hajooj kuka<br />

page 92 – UN Photo/Tim McKulka<br />

cover – hajooj kuka<br />

page 103 – hajooj kuka<br />

page 112 – Salahaldeen Nadir<br />

cover – Maxkabakov, Dreamstime.com<br />

page 128 – Dwnld777, Dreamstime.com<br />

page 146 – Maxkabakov, Dreamstime.com<br />

cover – Salahaldeen Nadir<br />

Sawtna<br />

.net<br />

www.sawtna.net<br />

info@sawtna.net


GUIDEBOOK FOR THE<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong><br />

for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong>


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> iii<br />

Contents<br />

Acknowledgements<br />

v<br />

Introduction 1<br />

Why this guidebook and what to expect 1<br />

Chapter 1: Blogging 5<br />

The global debate: the impact of ICTs on collective action<br />

and social change 7<br />

The Egyptian blogosphere before the Revolution 12<br />

Interviews: A snapshot of the Sudanese blogosphere 14<br />

A conversation with Sudanese blogger Amir Ahmad Nasr 14<br />

Reflecting on Sudan’s contemporary blogosphere with<br />

Omnia Shawkat 20<br />

Why do you need a blog in the age of Twitter and Facebook? 25<br />

Choosing a blog platform: Blogger, Wordpress and Tumblr 26<br />

Chapter 2: Twitter 29<br />

A brief introduction to Twitter 31<br />

How to gain followers on Twitter 32<br />

How to organize a social media campaign 38<br />

Measuring impact: social media analytics and real-time<br />

tracking of online campaigns 40<br />

Interview with Sudanese cartoonist Khalid Albaih 44<br />

Citizen journalism during Iran’s “Green Revolution” 50<br />

Revisiting the offline and digital campaign for Nuba<br />

Mountains detainee Jalila Khamis 53<br />

What Sudanese activists are learning from digital campaigns<br />

for political detainees 57<br />

Some useful social media applications 58


iv <strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Chapter 3: Crisis mapping 61<br />

Crowdsourcing: definitions and practical uses 63<br />

Crisis mapping: a basic introduction 65<br />

Other mapping platforms and what they offer 69<br />

Top crisis mapping challenges and selected solutions 74<br />

Interviews 79<br />

The uses and challenges of crisis mapping in Sudan and<br />

what we are learning 79<br />

How HarassMap in Egypt is using crisis mapping to fight<br />

the sexual harassment of women 84<br />

Fareed Zain: Sudan Vote Monitor 92<br />

Chapter 4: Crowdfunding 95<br />

A basic introduction to crowdfunding 97<br />

Trends in crowdfunding and the rise of civic crowdfunding 100<br />

Crowdfunding for countries under US sanctions 103<br />

Choosing a crowdfunding platform 105<br />

The story of #Nafeer: crowdsourcing in action 109<br />

How to run a successful crowdfunding campaign 112<br />

Interview 115<br />

Crowdfunding for the OUR SUDAN short film 115<br />

Chapter 5: Digital security 119<br />

Why digital security matters: global trends and the decline<br />

in net freedoms 121<br />

Internet freedoms in Sudan 124<br />

Protection against viruses, spyware and malware 128<br />

Using phones and mobile devices securely 130<br />

Resources for digital activists at risk 137<br />

Foundations for safe online browsing and communication 139<br />

Interviews 146<br />

The basics of digital security 146<br />

Mesh networking as a solution for poor connectivity or<br />

network interruptions 149<br />

Sudanese civil society and its digital security challenges 152<br />

Conclusion 155


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> v<br />

Acknowledgements<br />

This guidebook was inspired by the creative and free spirit of youth-led<br />

movements and civil society, in Sudan and globally, who are using information<br />

and communication technologies (ICTs) for peaceful social change. It is the<br />

outcome of my personal journey, a product of learning-by-doing, and a gift<br />

to a new generation in the hope that it can move forward from where others<br />

left, and not start from scratch.<br />

I am particularly thankful to the generous contribution of ten artists, writers,<br />

activists, civil society practitioners and experts working on the intersection of<br />

technology and human rights, peacebuilding and democracy or using ICTs<br />

to expand the impact of their work in these fields. They include: Amir Ahmad<br />

Nasr, Omnia Shawkat, Khalid Albaih, Helena Puig Larrauri, Rebecca Chiao,<br />

Fareed Zain, Dimah Abdulkarim, Eric Johnson, Nat Meysenburg and Abdel-<br />

Rahman El-Mahdi. Through in-depth interviews, they have shared their<br />

valuable insights and experiences, making this guide much more practical,<br />

and complementing the case studies with compelling real-life wisdom. Their<br />

stories taught me that passion and creativity can transform ICTs into tools<br />

for social good – especially when the technology is used strategically.<br />

A special thank you to colleagues who edited the final English manuscript,<br />

and to Rodrigo Davies and Helena Puig Larrauri for peer reviewing and<br />

lending their expertise to the chapters on crisis mapping and crowdfunding.<br />

Deep gratitude to Mohammed Al Maskati for teaching me about digital<br />

security in the most entertaining and fluid manner.<br />

I am endlessly grateful to the small team that made the journey enjoyable.<br />

The first iteration of this guidebook was released on the bilingual website<br />

that can be used in parallel with the guidebook www.sawtna.net. This would<br />

not have been possible without the technical support and diligence of web<br />

developer and designer Mosaab Baba. The talented translator and editor<br />

Azaz Shami oversaw the Arabic translation and editing of both the website<br />

and this guidebook. hajooj kuka provided illustrations, infographics and<br />

photography support. Animation artist and graphic designer, Bashir Hamid,<br />

created the front cover. And many others – especially my family – kept me<br />

going through their encouragement, thoughtful feedback and support.


vi <strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Key to icons<br />

Additional readings and materials.<br />

Case studies.<br />

Interviews.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 1<br />

Introduction<br />

INTRODUCTION<br />

Why this guidebook and what to<br />

expect<br />

The role of information and communication technologies (ICTs) and especially<br />

social media, in exchanging and disseminating information and enhancing<br />

public awareness as well as enabling collective action, collaborative<br />

initiatives and rapid mobilization, has now become a non-contested matter<br />

of fact. Some have gone as far as calling them “liberation technologies” that<br />

have helped herald a “fourth wave of democracy” in parts of the Middle East<br />

and North Africa in recent years. 1<br />

Those technologies were mostly embraced by non-organized citizens in<br />

closed societies where the physical space for discussion was not available<br />

and where thousands of people were moving to virtual spaces online to<br />

allow the free expression of opinions, the building of complex networks,<br />

the creation of social capital and finally political/social organization and<br />

mobilization. 2<br />

Digital technology has therefore revolutionized the way citizens and interest<br />

groups communicate and share information as well as the ease, scope and<br />

reach of activities due to the speed, reliability, scale, relative security and low<br />

cost of digital networks. 3<br />

To capitalize on these “liberation technologies,” this guide is written with the<br />

intention of targeting the Sudanese civil society in its most diverse sense,<br />

including journalists, pro-democracy activists, youth movement members<br />

and those working in the humanitarian sector, as well as non-organized<br />

citizens seeking to increase their civic participation in the public domain<br />

and online. It is a “how to” guide that stirs users toward good practices in<br />

using social media and ICTs more strategically for advocacy, campaigning,<br />

mobilization, dissemination of information and crowdsourcing. Our<br />

discussion will shed light on how digital activism is being used; when it is<br />

successful; and what impact it has on social movement processes and on<br />

the scale of change.<br />

1 Philip N. Howard and Muzammil M. Hussain. Democracy’s Fourth Wave? Digital<br />

<strong>Media</strong> and the Arab Spring. Oxford University Press. 2013.<br />

2 Ibid., pp. 17-18.<br />

3 Mary Joyce. Digital Activism Decoded: The <strong>New</strong> Mechanics of <strong>Change</strong>.<br />

International Debate Education Association, <strong>New</strong> York and Amsterdam. 2010.<br />

P. viii.


2<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Mobile phone subscribers in Sudan 2012-2013<br />

88%<br />

More<br />

than 27 million phone<br />

subscribers and coverage of 88<br />

percent, extending to 800 cities<br />

Data source: National Telecommunications Corporation (NTC), 2013.<br />

Sudan’s mobile and internet penetration<br />

100<br />

In 2012 Sudan’s Intenet penetration rate stood at 21% and mobile<br />

penetration at 60.49%. Sudan boasts the cheapest mobile post paid<br />

costs in the Middle East & North Africa, and healthy market competition<br />

amongst four telecom operators.<br />

90<br />

80<br />

70<br />

60<br />

50<br />

40<br />

30<br />

20<br />

10<br />

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013<br />

Mobile penetration rate (%)<br />

Internet penetration rate (%)<br />

Data source: International Telecommunications Union & World Bank.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 3<br />

The ICT sector in Sudan has experienced a remarkable boom in the last<br />

decade with a steadily increasing internet penetration rate of 23 percent in<br />

2013 (up from 21 percent in 2012, 19 percent in 2011, and 16.7 percent<br />

in 2010). 4 Mobile phone penetration has also seen a sharp increase since<br />

2000, standing at 75 percent by the end of 2013 – according to the<br />

International Telecommunication Union (ITU). 5 Although there are no hard<br />

statistics, our experience tells us that more citizens (especially youth) in<br />

Sudan are accessing the internet on their mobile phones than ever before.<br />

This is mainly because Sudan also boasts the cheapest post-paid mobile<br />

phone costs in the Middle East and North Africa (2012), made possible due<br />

to healthy market competition amongst four telecommunications providers.<br />

In early 2013, the National Telecommunications Corporation (NTC) reported<br />

more than 27 million cell phone subscribers in 2012 and a coverage of 88<br />

percent that extends to 800 cities and towns.<br />

This guide will build on the above-mentioned gains in Sudan’s ICT<br />

infrastructure. It is meant to be user-friendly and will draw from the experience<br />

of Sudanese youth movements and civil society groups that actively use new<br />

media and ICTs, as well as from the regional and international experience<br />

of civil society in countries such as Egypt, Iran, and Kenya, to mention a<br />

few. This will be done by providing a rich array of case studies, interviews,<br />

analysis, theories and examples to help guide you toward being better digital<br />

communicators; designing better online campaigns; and understanding<br />

what combination of digital tools can work to serve you more efficiently.<br />

The guide also assumes that its users are already using social media and<br />

ICTs to some extent and are looking for resources to improve their strategies<br />

and expand their tools beyond what is traditionally used.<br />

While this guide will explain the evolution and potential use of a variety of<br />

digital applications and tools (such as blogs, Tumblr, Twitter and Facebook)<br />

as well as concepts (such as crowdsourcing, crowd fundraising, crisis<br />

mapping and digital security), except for the case of Twitter, it will not teach<br />

you how to use these tools as much as it will guide you toward resources<br />

to investigate the tools and enrich your understanding on how to use those<br />

applications to their maximum potential when working for peaceful social<br />

change and expanded civic participation.<br />

INTRODUCTION<br />

4 http://data.worldbank.org/indicator/IT.NET.USER.P2.<br />

5 ITU data. Sudan mobile subscribers from 2000 to end of 2012.


CHAPTER 1<br />

Blogging<br />

BLOGGING<br />

1


6<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CHAPTER 1<br />

Blogging<br />

This chapter begins with an overview of the global<br />

conversation that activists, as well as internet<br />

and social media scholars, are having regarding<br />

the impact of ICTs on collective action and social<br />

change.<br />

We then move our focus to blogging and its advantages by first looking at<br />

the Egyptian blogosphere prior to Egypt’s 2011 revolution and how activists<br />

who doubled as citizen journalists and bloggers challenged the limits of<br />

press freedom and freedom of expression during Mubarak’s era.<br />

Shifting the focus toward Sudan we have two interviews about the Sudanese<br />

blogosphere and its evolution since 2006. Sudanese blogger and author<br />

Amir Ahmad Nasr spoke about the early years of the Sudanese blogosphere<br />

as well as his journey as a blogger that culminated in the publication of his<br />

book in 2013, My Isl@m: How Fundamentalism Stole My Mind – and Doubt<br />

Freed My Soul. 6 Cultural analyst Omnia Shawkat gives us an overview<br />

of currently active bloggers, the overriding themes in today’s Sudanese<br />

blogosphere, and how it reflects the country’s cultural scene.<br />

We conclude with a brief discussion on why blogging matters in the age of<br />

Facebook and Twitter. We then present a practical comparison between<br />

three popular and free blogging platforms (Blogger, Wordpress and Tumblr),<br />

explaining what they are best suited for and who should use them. This also<br />

encompasses a discussion about domain names and hosting options for<br />

personal and/or institutional blogs.<br />

6 Amir Ahmad Nasr. My Isl@m: How Fundamentalism Stole My Mind – and Doubt<br />

Freed My Soul. St. Martin’s Press. 2013.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 7<br />

The global debate: the impact<br />

of ICTs on collective action and<br />

social change<br />

With the advent of Facebook and Twitter, even before the Arab Spring<br />

revolutions in Tunisia and Egypt, a debate erupted about the real impact<br />

of social media tools on peaceful social change and civic engagement. In<br />

his controversial article, Why the revolution will not be tweeted, 7 Malcolm<br />

Gladwell argued against the efficiency of social media tools for activism.<br />

Using the American civil rights movement as a point of reference, he asserted<br />

that online activism allows only weak links or relationships to develop<br />

amongst people. He added that online organizing lacks the hierarchy and<br />

structure required to make organized activities work and endure and that<br />

online activism also lacks the “high risk” that compels people to act.<br />

Responding to Gladwell in Malcolm Gladwell is #Wrong, 8 a prominent<br />

young blogger Maria Popova asserts that, while “slacktivism” (passively<br />

associating with online causes) is a real problem, social media has been<br />

vital in raising awareness about critical issues and galvanizing action around<br />

them. “While awareness is certainly not a sufficient condition for activism, it<br />

is a necessary one,” she adds:<br />

Most human rights violations, from discrimination to genocide,<br />

can be attributed to one or both of two root causes: pluralistic<br />

ignorance (the tendency of a group’s members to incorrectly<br />

believe that the majority condones an injustice) and diffusion of<br />

responsibility (the conviction that someone else will take action<br />

against the injustices we are aware of). It takes a critical mass of<br />

awareness and assignment of responsibility for injustice to end.<br />

While the social web, with its inherent anonymity and predilection<br />

for slacktivism, may do little in the way of assigning responsibility,<br />

it has a monumental effect on awareness.<br />

Popova also debunks Gladwell’s assertion that online activism carries low<br />

risk, by reminding us that political bloggers and online journalists in nondemocratic<br />

countries such as Egypt and Yemen are getting detained for<br />

expressing themselves online. She adds that governments in countries like<br />

China and Uzbekistan are infringing on freedom of speech online through<br />

heavy online censorship and cyber attacks on bloggers and online activists.<br />

Hence, online activism does carry serious physical security risks in closed<br />

societies.<br />

BLOGGING<br />

1<br />

7 The <strong>New</strong> Yorker. Malcolm Gladwell. Why the revolution will not be tweeted.<br />

October 4, 2010.<br />

8 Design Observer. Maria Popova. Malcolm Gladwell is #Wrong. October 6, 2010.


8<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Responding to Gladwell’s point about the lack of hierarchies within the<br />

social web, Popova says: “Ultimately Gladwell’s mistake is seeing online<br />

and offline social networks as disjointed mechanisms.” She insists that<br />

hierarchies within the social web do exist, giving the example that those<br />

with a large following on Twitter can draw on their online network to reach<br />

large audiences.<br />

Giving examples from her personal life, Popova also dispels the claim that<br />

online interactions do not allow strong relationships to be built, adding that<br />

connections on social media can and have led to deep conversations that<br />

then transformed to offline relationships.<br />

<strong>Social</strong> media and internet scholar Clay Shirky, in his book Here Comes<br />

Everybody: the Power of Organizing Without Organizations, 9 points out that<br />

ICTs have created new incentives for groups to act collectively by cutting the<br />

costs and difficulties, which existed in the past, associated with collective<br />

action and with managing groups.<br />

On the other hand, Evgeny Morozov, who studied “the dark side of the<br />

internet” and how it is used to impede democratization, targets the more<br />

optimistic view of the internet. In his book, The Net Delusion: the Dark<br />

Side of Internet Freedom, 10 he stresses that the internet is good and bad<br />

for promoting democratic policy – it helps both dictators and democratic<br />

movements. He cites the Iranian government’s swift reaction after the<br />

“Green Revolution”, when it employed the very tools used by citizen activists<br />

and demonstrators to identify and arrest protesters. 11<br />

His main thesis is that the internet has become the new front for State<br />

propaganda, censorship and surveillance and that social media can<br />

implicate digital activists much more easily than traditional State intelligence.<br />

Morozov cautions against the Western coverage of the internet that is<br />

mostly dedicated to exploring the positive or “Cyber-Utopian” side of<br />

the internet. His philosophy is one of “cyber-realism”, where he urges a<br />

balanced understanding of the way the internet is used. He also cautions<br />

against “slacktivism” 12 and points out that Facebook and Twitter will not and<br />

cannot replace traditional forms of activism; they should only complement<br />

“real-life campaigns”. 13<br />

9 Clay Shirky. Here Comes Everybody: the Power of Organizing Without<br />

Organizations. Penguin Press. 2008. PP. 22-23.<br />

10 Evgeyny Morozov. The Net Delusion: the Dark Side of Internet Freedom. Public<br />

Affairs. 2011.<br />

11 Ibid., p. 11.<br />

12 Foreign Policy Magazine. Evgeny Morozov. The brave new world of slacktivism.<br />

May 19, 2011.<br />

13 Morozov defines “slacktivism” as a “feel-good online activism that has zero<br />

political impact,” and gives those who participate “an illusion of having a<br />

meaningful impact without demanding anything more than joining a Facebook<br />

group.” Ibid.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 9<br />

Global digital snapshot – January 2015 14<br />

A snapshot of the world’s key digital statistical indicators<br />

TOTAL<br />

POPULATION<br />

ACTIVE INTERNET<br />

USERS<br />

ACTIVE<br />

SOCIAL MEDIA<br />

ACCOUNTS<br />

UNIQUE<br />

MOBILE<br />

USERS<br />

ACTIVE<br />

MOBILE SOCIAL<br />

ACCOUNTS<br />

BLOGGING<br />

1<br />

7.210<br />

BILLION<br />

3.010<br />

BILLION<br />

2.078<br />

BILLION<br />

3.649<br />

BILLION<br />

1.685<br />

BILLION<br />

URBANISATION:<br />

53%<br />

PENETRATION:<br />

42%<br />

PENETRATION:<br />

29%<br />

PENETRATION:<br />

51%<br />

PENETRATION:<br />

23%<br />

Figure represents total<br />

global population,<br />

including children<br />

Figure includes access<br />

via fixed and mobile<br />

connections<br />

Figure represents<br />

active user accounts,<br />

not unique users<br />

Figure represents<br />

unique mobile<br />

phone users<br />

Figure represents<br />

active user accounts,<br />

not unique users<br />

We Are <strong>Social</strong> • Sources: Wikipedia; InternetLiveStats, InternetWorldStats; Facebook, Tencent,<br />

VKontakte, LiveIntenret; GMSA Intelligence<br />

14<br />

The Egyptian activist Alaa Abdel Fattah 15 responds to those who caution<br />

against “slacktivism” by reminding them that “slacktivism is a dangerous<br />

notion when you have options to do actual politics, but then choose to<br />

do something easy.” 16 However, in Mubarak’s era “‘slacktivism’ normalized<br />

political participation,” he says. He also adds that in Egypt, “factories and<br />

universities is where the real politics happen,” and the internet supported<br />

that by offering a medium that built “a single narrative that talks about<br />

revolution.”<br />

Zeynep Tufekci, 17 a sociologist who explores the intersection between<br />

technology and society, reflects on the use of technology during the Arab<br />

Spring and how it aided collective action by citizens. 18 Tufekci’s research<br />

and analysis implies that dictators in the Middle East did not fall earlier due<br />

14 We Are <strong>Social</strong> (blog). Digital <strong>Social</strong> & Mobile Worldwide in 2015. January 21,<br />

2015.<br />

15 FastCompany. What Makes Egyptian Blogger Alaa Abdel Fattah so Dangerous?<br />

March 28, 2014.<br />

16 YouTube. Personal Democracy Forum. Video: Alaa abd el Fattah: Weaving a<br />

network for change: Egypt. June 14, 2011.<br />

17 http://technosociology.org.<br />

18 YouTube. Ars Electronica. Public Square Squared – Zeynap Tufekci – EN.<br />

September 4, 2011.


10<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

to a “collective cost problem,” meaning that citizens were not collaborating<br />

effectively because they perceived the costs to be too high (torture,<br />

detention, censorship, restricted organization). According to Tufekci, this<br />

“collective cost problem” was the key factor in allowing authoritarian regimes<br />

to endure for decades.<br />

Although Tufekci acknowledges that there were multiple factors that led to<br />

the toppling of dictators in Egypt and Tunisia through popular revolt, she<br />

also credits the “new-media ecology” composed of satellite TV, cell phones<br />

with video capacity and social media platforms (Facebook and Twitter).<br />

This “new-media ecology” made it much harder for governments to censor<br />

and break up complex many-to-many networks of citizens connecting via<br />

social media after expressing common preferences for change. However,<br />

Tufekci cautions that, although new media tools have worked in creating a<br />

“cascade” to get rid of unpopular dictators, it is not clear how those same<br />

tools will work in the democratization phase.<br />

She adds that huge mobilizations, organized via social media, have often<br />

not led to changes in policies at the desired scale in countries like Egypt,<br />

Turkey and Ukraine. The reason, she says, is that social media have had<br />

the effect of a double-edged sword: they allow fast, large-scale and cost<br />

efficient mobilization, but valuable time is lost that (before the advent of the<br />

internet) was used to slowly organize and strategize, in order to identify<br />

tactics that will sustain momentum. 19<br />

In her critique of Morozov’s book, The Net Delusion, Tufekci asserts that<br />

the internet has been one of the most empowering technologies in human<br />

history, and that the problem lies not with the technology, but with “citizen<br />

disempowerment” and “politics that has failed.” She continues to say:<br />

I do think Morozov underestimates the ecological effect of the<br />

Internet in potentially undermining the legitimacy of authoritarian<br />

regimes. Crushing of dissidents individually may certainly help<br />

an authoritarian regime remain in power in the short term, but<br />

too much repression, coupled with an unhappy citizenry that is<br />

able to share their displeasure with one another, can hollow out a<br />

regime’s legitimacy, ultimately crippling its capacity for repression,<br />

as there is almost no purely coercive regime. In other words, while<br />

increased capacity for surveillance may be a very real threat to<br />

individual dissidents, broadening the repressive apparatus often<br />

ultimately backfires, especially under conditions with lower barriers<br />

to collective action and information diffusion, both of which are<br />

promoted by the Internet. 20<br />

19 <strong>New</strong> York Times. Zeynep Tufekci. After the Protests. March 19, 2014.<br />

20 The Atlantic. Zeynep Tufekci. Delusions Aside, the Net’s Potential Is Real.<br />

January 12, 2011.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 11<br />

A research study by the University of Washington in Seattle, looking at the<br />

relationship between digital activism and non-violence, collected the first<br />

comprehensive data set of protests from around the world. 21 The study<br />

concluded that digital activists rarely resorted to cyber-crimes or hacking,<br />

and that Facebook and Twitter were the social media tools that globally<br />

dominated digital campaigns. However, the study also noted that there were<br />

variations across regions and that there is no “‘killer app’ that makes some<br />

campaigns more successful than others.” The more diverse is the digital<br />

toolkit, the higher the possibility of success. The target of digital campaigns<br />

also mattered: “If the objective is change of government or government<br />

policy, civil society groups have demonstrated success with just modest<br />

street protests and a few digital tools. Both recipes for success are true<br />

regardless of regime type.” 22<br />

BLOGGING<br />

1<br />

Some videos to watch<br />

Al Jazeera Stream. Cyber realism versus Cyber-utopians. 23<br />

TED Talk. Evgeny Morozov: How the Net aids dictatorships. 24<br />

Personal Democracy Forum. Alaa abd el Fattah: Weaving a network for<br />

change: Egypt. 25<br />

Zeynep Tufekci speaks about social media and collective action under<br />

authoritarian regimes. 26<br />

21 Frank Edwards, Philip N. Howard and Mary Joyce. Report on Digital Activism<br />

and Non-Violent Conflict. November 20, 2013.<br />

22 The first data set included a total of 1,180 cases from 151 countries from 1982 to<br />

2012. Another data set was comprised of 426 coded cases from 100 countries<br />

between 2010 and 2012.<br />

23 Al Jazeera Stream. Cyber realism versus Cyber-utopians. September 1, 2011.<br />

24 TED. Evgeny Morozv. How the Net aids dictatorships. July 2009.<br />

25 YouTube. Personal Democracy Forum. Alaa abd el Fattah: Weaving a network<br />

for change: Egypt. June 14, 2011.<br />

26 YouTube. Ars Electronica. Public Square Squared – Zeynap Tufekci – EN.<br />

September 4, 2011.


12<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CASE STUDY 1: EGYPT<br />

The Egyptian blogosphere<br />

before the Revolution<br />

Between 2002 and 2006, before the age of Facebook and Twitter,<br />

bloggers were the main online activists and “citizen journalists” in<br />

Egypt. They led the independent media and pushed the limits of press<br />

freedom by:<br />

● Breaking stories that would have otherwise been overlooked.<br />

Egyptian bloggers broke major stories on sexual harassment,<br />

election fraud (in 2005), police brutality, and the mistreatment of<br />

Sudanese refugees.<br />

● Documenting stories with unique photographic and video<br />

evidence. The Egyptian bloggers were actually active on the<br />

ground. They organized events and demonstrations and used their<br />

cameras to cover events that the traditional media would not cover.<br />

● Transmitting stories to a global audience. Blogs, unlike<br />

Facebook today, were mostly open to all viewers, with some blogs<br />

getting thousands of visitors daily, such as that of the famous blogger<br />

Wael Abbas, 27 “Al Wa’ii Al Masri,” that was getting up to 30,000 hits<br />

a day. 28<br />

● Speaking about topics that were “off limits” to the traditional<br />

Egyptian media, such as criticizing the regime or the military. By the<br />

end of 2004, movements such as “Kifaya” started to gain a following<br />

and were asking for change in the run-up to the 2005 elections.<br />

They held demonstrations that were not covered by the traditional<br />

media. Bloggers filled this gap by posting footage and photos of<br />

these events that often included police clashing with protesters.<br />

● Collaborating with both citizens and the traditional media<br />

through blogging. For example, footage showing the torture of<br />

prisoners in police stations was given to the blogger Wael Abbas.<br />

This footage, which was only published online, was used as<br />

evidence in the court trial of a police officer, who was later sentenced<br />

to three years’ imprisonment. In other cases traditional journalists<br />

used recordings and photos taken by bloggers without mentioning<br />

the source. This alliance between bloggers and traditional journalists<br />

created a new kind of journalism. 29<br />

27 http://misrdigital.blogspirit.com.<br />

28 Reporters Without Borders. Handbook for Bloggers and Cyber-Dissidents.<br />

March 2008. PP. 40-41.<br />

29 My heart’s in Accra (blog). Wael Abbas on video and social media in Egypt prior<br />

to the revolution. January 13, 2012.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 13<br />

The Egyptian government’s response<br />

● As early as 2002 the Egyptian government was wary of bloggers and<br />

set up a special intelligence unit to survey blogs.<br />

● In 2006, there was a big attack on bloggers during a protest resulting<br />

in mass arrests and up to two months’ arbitrary detention for some.<br />

In reaction, a lot of the bloggers reduced their activities and some<br />

even left Egypt.<br />

BLOGGING<br />

1<br />

How Egyptian bloggers are adapting in the age<br />

of Facebook and Twitter<br />

● Today the bloggers of the last decade are adapting. For example,<br />

Wael Abbas says that he is using new platforms, such as the microblogging<br />

tool Twitter to adapt to the times. He says Twitter allows<br />

him to cover an event in real-time by linking it to his mobile phone’s<br />

camera.<br />

● Hence, the bloggers of the new era are pushing media boundaries<br />

and competing with media giants such as Al Jazeera and the BBC,<br />

who, in the absence of access to certain places, have no choice but<br />

to depend on citizen journalists.


14<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Interviews:<br />

A snapshot of the Sudanese<br />

blogosphere<br />

A conversation with Sudanese blogger Amir<br />

Ahmad Nasr<br />

Amir Ahmad Nasr is the author of a recently published<br />

autobiography, My Isl@m: How Fundamentalism Stole My Mind –<br />

and Doubt Freed My Soul. He was one of the first Sudanese bloggers<br />

to blog in English and the most famous. The book started as a sixyear<br />

journey of anonymous blogging to unearth difficult questions<br />

about Islam, identity, the politics of the Middle East region and much<br />

more. It has a lot of references to online activism and communities of<br />

interest in the Arab and Islamic blogosphere. It is probably one of the<br />

best Sudanese documents on the impact of blogging and how it can<br />

move to collective and concrete action – albeit in a more global and<br />

regional sense – especially in closed and undemocratic societies.<br />

In Sudan we have not yet capitalized on the power of blogging like<br />

other countries with more substantial blogospheres.<br />

In this interview, Amir explains what led him to blog, why he blogged<br />

for six years, and what impact that had on his life.<br />

(The interview has been edited for brevity.)


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 15<br />

Q1. In your book, My Isl@m, you observed in 2006 that “a<br />

Sudanese blogosphere made of Sudanese bloggers speaking<br />

about Sudanese issues, was nowhere to be found.” This<br />

absence of a Sudanese blogosphere a few years ago was<br />

obviously a motivator to you. Can you tell us when and why<br />

you started blogging?<br />

I started blogging in April 2006. By complete accident I discovered<br />

this website called The Big Pharaoh. 30 After exploring it, I noticed<br />

it didn’t look like a typical website. When I looked at it and I read, I<br />

realized it was something called “a blog.”<br />

In a blog you have different posts, in sequence, from the older to<br />

the newest post. And the newest post tends to be on the top,<br />

and blog posts are arranged sequentially. Then there’s a comment<br />

section where people can write their thoughts and respond to you<br />

directly as a blogger. I was fascinated and blown away by the format<br />

and how “The Big Pharaoh” was using it to write about all sorts of<br />

controversial issues in Egypt. He was a secular and very liberal guy,<br />

and he was talking about sex, God, politics, women’s rights, Islam<br />

and atheism. Things that were really provocative, and that people<br />

wouldn’t dare talk about openly.<br />

I was intrigued because I had a lot of questions growing up that I was<br />

too scared to confront and to answer. Questions about the nature<br />

of religion and the nature of God. About the Quran and whether it is<br />

really the word of God. And “The Big Pharaoh” was tackling these<br />

questions openly, so I became obsessed. In his blogs he linked<br />

to other blogs, including Iraqi blogs and Palestinian blogs, Saudi<br />

and Algerian. They were all talking about the different issues that<br />

they confronted in their countries. The Iraqi blogosphere during the<br />

American-led invasion of Iraq was very active and the conversation<br />

was very heated.<br />

Darfur was a horrendous tragedy in 2006-2007, and I asked myself:<br />

“Egyptians are talking about Egyptian issues and others are talking<br />

about their issues. Where are the Sudanese bloggers?” There were<br />

other [English-language] blogs, but they were also authored by non-<br />

Sudanese. So I asked “Big Pharaoh,” and he told me, “as far as<br />

I know I’ve never come across a Sudanese blog in English, by a<br />

Sudanese. Why don’t you be the first one?”<br />

My reaction was: I don’t have much to say, I wasn’t an expert on<br />

politics, I didn’t have much knowledge. His response to me was:<br />

“Tell stories.” So I began writing about Darfur and educating myself,<br />

and through this process I learned a lot.<br />

BLOGGING<br />

1<br />

30 http://bigpharaoh.org.


16<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Q2. In your view how has the Sudanese blogosphere evolved<br />

since then?<br />

In April 2006 there was no Sudanese blogosphere. I went to online<br />

forums like “Shamarat” and “Sudan.net,” and I tried to get people<br />

who were posting actively in those forums to blog. I told them that<br />

writing in these forums limits them to the Sudanese audience that<br />

visits the forums but, when it comes to the rest of the world, no<br />

one is seeing what they have to say. Blogging is a more powerful<br />

medium. When you blog, you have complete control to say whatever<br />

you want. There is no administrator who can kick you out, ban you<br />

or delete your stuff. You have sovereignty on that medium and it’s<br />

open to the world and people can engage with you. I succeeded to<br />

recruit a few who in turn recruited others. And we began having a<br />

small active Sudanese blogosphere.<br />

Between 2006 and 2009, I was the only one blogging very actively.<br />

Many of the others had to stop blogging and became inactive. I will<br />

definitely give credit to Reem, who had a blog with the tagline “I have<br />

no tribe, I’m Sudanese,” and her blog remained active, along with a<br />

few others. 31<br />

The biggest challenge was that many people were not active.<br />

Thankfully that changed. As more people joined, more blogs started<br />

and I became less active by 2011. But unlike before, when we<br />

had a Sudanese blogosphere, the bloggers were not interacting<br />

together and networking, engaging and discussing, because now<br />

the conversation shifted to Twitter and Facebook.<br />

In a sense that was a positive development, because the good<br />

thing about Facebook is that you don’t need to build an audience.<br />

Sudanese bloggers abandoned blogging because, when you blog,<br />

you don’t just blog, you have to market your post and you have to<br />

engage others to read what you have to say. And if no one is reading<br />

what you’re writing, then you lose motivation. While on Facebook,<br />

your friends and their friends are the audience.<br />

Unfortunately, on Facebook, and even more on Twitter, you are not<br />

able to discuss much when you have 140 characters. It’s not the<br />

same as writing a coherent, well-thought-out article that’s 1000<br />

words long. You just write a short post on your [Facebook] status<br />

update that is 200-300 words, and people like it and comment;<br />

that is it. But are we really having a deep, important, intellectual<br />

conversation? The blogosphere was excellent for that because you<br />

would write long arguments, and elaborate on your point.<br />

I was lucky to build an audience that was active, and who read my<br />

writings even when it was a long post. There are pros and cons.<br />

Right now there are more Sudanese bloggers, but they are not as<br />

31 http://www.wholeheartedly-sudaniya.blogspot.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 17<br />

tightly knit. The conversation isn’t really happening amongst them.<br />

They are not discussing things together; they are not having a good<br />

debate. The conversation is on Facebook. And it’s in the form of<br />

short comments. Which is not a bad thing, but again it does not<br />

allow you to discuss a topic in depth.<br />

Q3. You describe your relationship with blogging as: “A quest<br />

to learn and unlearn. To blog and to grow.” How did this<br />

journey of learning and unlearning go? What were the ups<br />

and downs? What were the highlights?<br />

The positive thing that comes with “unlearning” is that unlearning<br />

involves questioning and rejecting what doesn’t make sense. I think<br />

unlearning is a lot more important than learning. Because if you learn,<br />

and what you already know or what you think you know is flawed,<br />

then what you learn is going to be built on top of a foundation that<br />

is messed up, tainted, toxic and full of lies. The upside to that is that<br />

you get to discard a lot of nonsense, lies, propaganda, dogma, and<br />

indoctrination; and that is extremely liberating. It makes you a more<br />

enlightened person.<br />

The downside is that this is a painful and messy process sometimes.<br />

Especially when you are unlearning, questioning and rejecting things<br />

that are considered taboo. I happily and openly state in this interview<br />

right now that I consider myself mostly a non-believing Muslim.<br />

Meaning I don’t believe dogmatically in the doctrines that we’re<br />

supposed to believe in. That comes as part of the questioning, the<br />

unlearning and the rejection of the things that don’t make sense.<br />

I have my own spiritual practice. I consider myself a Sufi-oriented<br />

Muslim. It’s a spirituality of mine, and it’s a cultural identity.<br />

BLOGGING<br />

1<br />

Q4. When describing the Arab blogosphere you say in the<br />

book that “an intellectual revolution was happening in the<br />

Arab blogosphere,” and that “Arab dissidents and political<br />

‘heretics’ of all stripes were discovering one another online<br />

and slowly forming a massive self-organized network.”<br />

Can you elaborate on how those online interactions were<br />

transforming into concrete networks in real life offline?<br />

With blogging what happens is that you begin to realize: “I’m not<br />

the only one with radical ideas. I’m not the only one asking these<br />

questions”. When you realize that there are many people all over<br />

the world who have similar backgrounds like you, and who have<br />

been asking these questions, and have been in pain and they<br />

have struggled, you feel a sense of kinship with these individuals.<br />

So you begin to email each other, and to network and have Skype<br />

conversations and chats. You begin to bond.


18<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

In many cases the bonding happens over anonymous email<br />

addresses – you want to be anonymous because you don’t trust<br />

the other person. But after a while you realize that you can trust<br />

this person. Then you reveal your real name, people find out who<br />

you are, then you become friends in real life. You then form a<br />

network, and organizations step in because they want to facilitate<br />

the discussion in real life. They create conferences where they invite<br />

you and the bloggers so that the conversation that happens online<br />

is taken offline. You meet people for the first time face-to-face, but<br />

you feel like you’ve known each other forever. There’s a real sense<br />

of camaraderie.<br />

There’s a gathering that I wrote about in my book. It was a gathering<br />

in Beirut in 2009, the second Arab Bloggers summit, and it was<br />

amazing. That network was crucial during the Arab uprisings<br />

because there was already a lot of trust among the people. Can<br />

a similar scenario unfold now? Unfortunately I don’t think it would<br />

be that easy because these networks are powerful and in some<br />

cases have been infiltrated. Even with the events that happen now,<br />

governments are aware of the power of digital media and digital<br />

activism. So it is not as easy to trust new names and new faces that<br />

are parts of these movements. Even in my own personal life, my<br />

circle of trusted friends remains with people that I have known from<br />

the old days.<br />

Q5. Finally, you blogged anonymously for six years. Why did<br />

you choose to do that? Can you speak about the virtues of<br />

anonymous blogging and what it can offer bloggers in nondemocratic<br />

settings or where freedom of expression is under<br />

attack?<br />

There has been a big debate over the past years about anonymity.<br />

Google, for example, has a policy where it wants you to use your<br />

real name. Facebook demands that you use your real name. Some<br />

people have been fighting that, saying they should make exceptions<br />

for people who live under regimes that are oppressive. I absolutely<br />

support that. My friend Jillian York, with the Electronic Frontier<br />

Foundation, she has been pushing for that. 32<br />

I believe in the virtue of anonymous blogging. Anonymous blogging<br />

can be abused, for sure. You can slander people, you can insult<br />

them, you can defame them, and that’s bad. But the negative side<br />

does not outweigh the positives of anonymous blogging, because<br />

when you’re anonymous you’re able to write provocatively, honestly,<br />

frankly, and in a blunt and straightforward manner about topics that<br />

need to be robustly discussed. In many countries around the world<br />

one cannot do that with one’s real name.<br />

32 https://www.eff.org.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 19<br />

In my case I said what I said anonymously because I was afraid of the<br />

repercussions. The beauty of anonymous blogging is that (and I’ve<br />

seen people go through this transformation) you blog anonymously<br />

and you’re afraid, then you develop a sense of conviction, then you<br />

realize that you don’t like being anonymous anymore. Which is why<br />

I made that conscious decision to reveal my identity during the Arab<br />

uprisings in 2011. I had friends in Tahrir Square in Egypt, and friends<br />

who went to Libya who risked their lives, and I am going to worry<br />

about anonymity?<br />

Was [revealing my identity] a beautiful event that had no<br />

consequences? No, because after I revealed my identity I got into<br />

certain issues and I had challenges. I will not elaborate on what they<br />

are, but it came at a cost. Was it worth it? I still say absolutely! But<br />

it does not mean that I am discarding the virtues of anonymous<br />

blogging. It is here to stay and it is absolutely important, and I think<br />

Facebook and Google should seriously reconsider their position on<br />

this matter.<br />

BLOGGING<br />

1<br />

Additional reading on Amir Ahmad Nasr<br />

● Amir’s blog. 33<br />

● Book review on Amir’s book My Isl@m. 34<br />

33 http://www.amirahmadnasr.com/blog.<br />

34 Foreign Policy Magazine. Dalia Haj-Omar. A Frank Debate about Identity and<br />

Islam. July 30, 2013.


20<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Reflecting on Sudan’s contemporary<br />

blogosphere with Omnia Shawkat<br />

Omnia Shawkat is a young Sudanese and global citizen. She<br />

is an avid commentator on Sudanese current affairs and is<br />

interested in learning and sharing an intergenerational perspective<br />

of Sudanese culture. During 2012 and 2013 Omnia did an on-theground<br />

exploration of the Sudanese cultural scene that was then<br />

complemented by a survey of Sudanese blogs to study whether the<br />

richness of Sudan’s cultural diversity was justly reflected online. In<br />

this interview she tells us about her findings.<br />

Q1. You have been doing a survey of active Sudanese bloggers<br />

in 2013. What general trends do you see in terms of topics<br />

and themes that are addressed (social, cultural, religious,<br />

political, etc.)?<br />

I found there is a lot of poetry and political analysis. In both we see<br />

that the identity matter is reflected in all the writings, no matter what<br />

the topic is. The themes are usually about belonging [as] there is a<br />

lot of diaspora writing from all parts of the world. But even Sudanese<br />

who are blogging [from Sudan] are writing about their own belonging<br />

and their own culture.<br />

Q2. How big or small is the Sudanese blogosphere, and are<br />

the majority blogging from inside Sudan or outside?<br />

Almost half are in Sudan and half are outside Sudan. So far I have<br />

come across 33 or 34 blogs that are either political or poetic, or<br />

creative writing and short stories. A lot of them are people reflecting<br />

on topics that are of relevance to them, with the topic of Sudanese<br />

culture as the backdrop.<br />

Q3. In terms of the on-the-ground cultural scene, can you<br />

tell us a bit about what’s happening and the kind of activities<br />

as well as the restrictions? Also, is that cultural scene justly<br />

reflected online?<br />

There are a lot of perspectives on that, so let us take it step by<br />

step. First there is a scene that is targeting the senior audience.<br />

It attracts Sudanese and non-Sudanese and it is mostly for the<br />

older generation. That [scene] is more about songs and fine art,<br />

but it’s also about social issues, and they tend to have fundraisers<br />

associated with that. It’s been going on for years at the Rashid Diab<br />

Arts Center for example – it is the most frequent one. The audience<br />

you see there is quite diverse. You see all types of people but they<br />

are mostly from the older generation. 35<br />

35 http://www.rashiddiabartscentre.net/indexen.php.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 21<br />

The younger generation have a more restricted medium to work<br />

with because they don’t have the same type of sponsorship or<br />

the diplomatic relations that someone like Dr. Rashid Diab has.<br />

Their events tend to have a more secretive veil. The networking<br />

that happens to advertise their events is very small. You won’t find<br />

posters for their events on bridges and in universities and places<br />

like that. It would be within a certain network, let’s say a Facebook<br />

page or a mailing list. The audience is vibrant. It’s Sudanese who<br />

have been in Sudan all their lives as well as Sudanese who have<br />

lived outside of Sudan, and it’s a nice mix of Sudanese from one<br />

generation. They are mostly tech savvy, which is how they get to<br />

know about these events. One of these examples would be Nas with<br />

Notepads and before that open mic events. 36<br />

BLOGGING<br />

1<br />

The third scene that I saw was more of an international scene. It<br />

is diplomats or expats who have cultural events or openings at art<br />

galleries. It attracts Sudanese who have access to that scene. But<br />

it’s a reflection of Sudanese culture through their eyes/perspective.<br />

In terms of restrictions there are definitely a lot of restrictions,<br />

especially for the youth scene, but also for Dr. Rashid Diab. I interned<br />

for him for a while, and I remember sitting at the office and seeing<br />

that they had a lot of issues with permits, especially now compared<br />

to 2010. The permits are a bit more restricted now and they have to<br />

go through the security offices. Fundraising has also been a problem.<br />

But the youth scene is a lot more restricted. They are always worried<br />

about raids and infiltration by [State security] agents who can shut<br />

down an event on the spot (which happened with open mic events).<br />

This is an aspect that they have learned to adapt to from their open<br />

mic experience. The events have become a lot more secretive and a<br />

lot more exclusive. So there are ways that people are adapting, but<br />

it is restricting the movement and restricting the audience. It made<br />

culture become more “zoned” – so you have zones and “hot spots”<br />

where culture is and other places where you can’t find that access.<br />

I don’t know about other States [outside Khartoum] unfortunately,<br />

but I know that Port Sudan, for example, has a big cultural festival.<br />

We have a big music industry. If you turn on the Sudan television<br />

or any of the other networks you’ll find that there’s always singing.<br />

Whether it’s religious singing, or Madeeh, or normal folklore singing,<br />

and all kinds of music. But we don’t have an industry per se. You<br />

would find private parties would hire a singer, but we don’t have<br />

festivals. You don’t hear about Sudanese singers making it regionally<br />

or internationally. There are people like Mosno; 37 and Nile, who<br />

is based in Dubai. But they made it on their own, and there’s no<br />

36 http://naswithnotepads.com.<br />

37 500words Magazine. Omnia Shawkat and Ahmad Salah. On Mosno Al-<br />

Moseeki’s Fairy Tale Novella. May 15, 2014.


22<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

movement in Sudan that can propel them further. The ones that<br />

make it in Sudan, like Taha Suliman, are very popular but there’s<br />

not that much of a scene outside of the weddings and the shows<br />

that he does. There’s a few of these concerts, like Igd Algalad and<br />

such, which you can find posters for publicly and they appeal to a<br />

wider audience. But they have been around for decades; that’s why<br />

people know them and love them and they go to them.<br />

Q4. In a country where freedom of expression and association<br />

are under attack, is the Sudanese blogosphere coalescing into<br />

a safe haven for communities of interest? In other words, is it<br />

allowing discussion of topics that are off-limits otherwise? Is<br />

it allowing communities of interest to form online?<br />

Absolutely. Not only are people allowed to talk about politics, which<br />

is something that they might not have the ability to speak of in a<br />

public setting, but Sudanese outside of Sudan and Sudanese inside<br />

of Sudan are finally meeting to talk about shared interests. Also<br />

internet penetration in Sudan is high, especially for mobile phones,<br />

so you have Facebook and Twitter. People are on these devices,<br />

connected to other people talking about topics of interest.<br />

But I also think that, because we don’t have a big publishing<br />

industry, poets for example (they don’t have topics that they can’t<br />

address publicly) have created names for themselves online. If they<br />

try to publish their work offline it would be very difficult because there<br />

are a lot of restrictions on publishing houses and there are not a<br />

lot of funds going to that industry. So they navigated through this<br />

challenge and found an online haven that can provide for them and<br />

they could have a network to publicize their work. They can grow<br />

and even form interest groups where they give each other coaching<br />

lessons or creative writing lessons and workshops, which is actually<br />

happening.<br />

Can you give us examples of these platforms and such<br />

writers?<br />

NubianQ has a blog and she is a brilliant writer. 38 She is a short<br />

story writer but also writes poetry. You’ve got someone like Jogs<br />

of a Pen (@Shahdinator on Twitter), which is a brilliant poetry blog<br />

that has been there for years and has beautiful pieces. 39 But also on<br />

Twitter, for example, the “Jogs of a Pen” author with another author/<br />

blogger called Halloya (@Hallaloyaa), they often go into freestyling<br />

battles with each other by writing [poetry] lines to each other. Some<br />

of these people online I see at offline events, like with the Nas with<br />

Notepads events, where I see some of the people online share their<br />

38 http://nubianq.com.<br />

39 http://jogsofapen.blogspot.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 23<br />

poetry with a very exclusive [crowd]. But at least it’s there for people<br />

who don’t see it online.<br />

Q5. Are Sudanese bloggers mostly anonymous or not?<br />

Do they feel safe to express themselves online? Are there<br />

advantages to anonymous blogging in an unfree country like<br />

Sudan? Are there disadvantages?<br />

It’s interesting because I would think political writers would go<br />

anonymously, and creative writers would not. But it’s actually the<br />

opposite; it’s creative writers who are anonymous. And you have<br />

political writers, like Maha Elsanosi whose blog is Mimzology; 40 you<br />

have Reem Shawkat whose blog is Wholeheartedly Sudaniya; 41 you<br />

have “Sudanese Thinker” who is out now (he had been anonymous<br />

for some time) whose name is Amir Ahmad Nasr. 42 You have<br />

someone like Yasir Dahawy … There’s a huge generational gap in<br />

terms of expression. We are a very oral society. People are talking<br />

about politics at every social event, but not a lot of people sit down<br />

and write their thoughts in a logical sequence and share their<br />

thoughts in printed form.<br />

There is a huge crackdown on printed media [by the State] and<br />

young people don’t feel that interested in print media, because those<br />

who read print media are not our generation. So the youth are trying<br />

to compensate for that gap [online]; and they are doing it bravely<br />

without having to do it anonymously.<br />

BLOGGING<br />

1<br />

Q6. What have some of the prominent bloggers achieved?<br />

Mimzology and Wholeheartedly Sudaniya won blogger awards<br />

consecutively in 2011 and 2012; and Amir Ahmad Nasr published<br />

a book. Bloggers are pretty supportive of each other and publicize<br />

each other’s work. They are finding ground to connect without having<br />

to ever meet. And they are forming networks online and offline. It’s<br />

difficult to generalize, but it seems like a very buzzing scene.<br />

Q7. Finally, how do you respond to those who say, “Why do I<br />

need a blog in the age of Facebook and Twitter?”<br />

A lot of people on Facebook and Twitter have random thoughts that<br />

they are constantly injecting to their timelines or statuses. The blog<br />

is an eloquent form of writing; you have to put your thoughts in a<br />

logical sequence. It’s also a documentation of your thoughts. Blogs<br />

can be archived; they can be used for research; and they can be<br />

shared with a wider audience [more] than a status update that stays<br />

on the timeline for 50 seconds or a minute.<br />

40 http://mimzology.blogspot.com.<br />

41 http://wholeheartedly-sudaniya.blogspot.com.<br />

42 http://www.amirahmadnasr.com.


24<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

There is a huge audience that you can tap into on topics such<br />

as art, identity, contemporary politics and social history. This tech<br />

savvy generation is utilizing different platforms. So you don’t need<br />

a blog, unless you find that your thoughts need to be put in a blog.<br />

Otherwise you can thrive on Twitter, but I really think that the archiving<br />

of documented thoughts is the appeal of a blog.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 25<br />

Allows deep flushed-out thinking, reflection and debate<br />

Anonymous blogging<br />

To create a<br />

“counter-narrative”<br />

Why Blog?<br />

To create “alternative public spaces”<br />

BLOGGING<br />

1<br />

To centralize your presence online<br />

Why do you need a blog in the<br />

age of Twitter and Facebook?<br />

If you have read the interviews with blogger/author Amir Ahmad Nasr and<br />

cultural analyst Omnia Shawkat you should be convinced by now that<br />

blogging remains an important tool even in the age of social media. Below<br />

we have distilled their words of wisdom on why blogging still matters in the<br />

age of Facebook and Twitter.<br />

• Centralize your presence online in one place that is easily searchable<br />

and archivable. By using widgets you can display your Twitter, Facebook<br />

and other social media timelines on your website. Blogs also have more<br />

advanced searching and archiving functions, and hence are ideal for<br />

documenting and research. Facebook and Twitter pages are hard to search<br />

and therefore difficult to do research on or to retrieve older posts from.<br />

• Deep flushed-out thinking, reflection and debate, as opposed to<br />

brief status updates and comments. This can include creative writing,<br />

political analysis, photo documentary and/or video blogging.<br />

• Anonymous blogging can give you the freedom to express yourself<br />

and engage with others without fear, especially when addressing topics<br />

that are considered taboo by the authorities or society.<br />

• The creation of a “counter-narrative.” In countries where freedom<br />

of expression and association are under attack and where most of the<br />

media is State-controlled, a sizable blogosphere can challenge the<br />

dominance of State propaganda and create a counter-narrative based<br />

on the sharing of collective citizen grievances.<br />

• The creation of “alternative public spaces.” When freedom of<br />

assembly is limited, the blogosphere, just like social media platforms,<br />

offers possible spaces of assembly and discussion. Those spaces,<br />

however, are not always safe, since most governments are conducting<br />

heavy surveillance on social media platforms nowadays!


26<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Choosing a blog platform:<br />

Blogger, Wordpress and Tumblr<br />

For simplicity, the most popular (and free) blog platforms are discussed and<br />

compared below to help you decide what would work best for you. Opening<br />

a blog is as easy as opening an email account; the hard part is creating<br />

the content and keeping the blog active. The blogs discussed below are<br />

the most user-friendly. These blogs can be used without any advanced<br />

programming skills as they have many ready to use themes/templates<br />

(unless you are seeking advanced customization in the case of Wordpress<br />

and Tumblr). 43<br />

1. Blogger (also BlogSpot) 44<br />

Blogger is the easiest and fastest way to start your first blog. It has a user<br />

friendly interface and has a setup wizard that allows you to be up and running<br />

quickly. Blogger is owned by Google and is easily integrated with Google<br />

analytics to give you professional statistics on how your blog is doing.<br />

Who is this for? Beginners and casual bloggers should consider starting<br />

with Blogger. Later, if the need arises, they can move on to another platform.<br />

Its limited themes and design styles make Blogger seem less professional.<br />

2. Wordpress 45<br />

Wordpress is an extremely flexible and powerful blogging platform that<br />

can be used as a content management system for websites. There are<br />

thousands of themes and plugins that can make your blog look great<br />

and have many features. With all these choices and power comes some<br />

complexity in its setup and configuration. But once up, it is easy to use and<br />

maintain.<br />

Who is this for? This is the way to go for professional bloggers, artists,<br />

independent media outlets, civil society groups, including NGOs, and also<br />

the private sector.<br />

43 This is a useful resource with recommendations on how to set up a blog and how<br />

to write a blog: http://www.theminimalists.com/how-to-set-up-a-wordpressblog/<br />

and http://www.theminimalists.com/blog/#recommendations.<br />

44 http://www.blogger.com.<br />

45 http://wordpress.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 27<br />

3. Tumblr 46<br />

Tumblr is a form of micro-blogging that focuses less on writing and more<br />

on sharing pictures, videos and visual art content. It is easy to publish on,<br />

even through SMS and email. It also has many great looking and fun to view<br />

themes; and it works well on mobiles and tablets.<br />

Who is this for? Tumblr is great for photographers, artists, video bloggers,<br />

and as a commentary tool on other websites’ content through sharing links<br />

and embedding their content. But due to its highly visual nature, Tumblr is<br />

recommended for non-writers and mainly for sharing pictures and videos<br />

with limited text.<br />

BLOGGING<br />

1<br />

Hosted vs. self-hosted blogs<br />

Obtaining paid hosting services can be difficult and costly, specifically in<br />

countries impacted by US financial sanctions (such as Iran, Sudan, Syria,<br />

Cuba, and North Korea). However, free options for blogging are abundant.<br />

Even though the free options would not include a personalized domain<br />

name (www.yourname.com), hosted URLs are available at no charge<br />

(yourname.wordpress.com). Below is a breakdown of how to choose the<br />

right hosted solution for your blog.<br />

Hosted blogs are 100 percent free, easy to set up blogs that are hosted<br />

on the platform’s server (e.g. on Blogger, Wordpress.org or Tumblr servers).<br />

This reduces the complexity of setting up a blog, and makes the process<br />

similar to setting up a Facebook page or opening an email account.<br />

Who is this for? Individuals and/or institutions and those who do not feel<br />

like plunging into web development should start with a hosted platform.<br />

Besides the ease of use, it also welcomes you into a community that the<br />

platform provides.<br />

Companies, NGOs, professional writers and artists might need the power to<br />

design a unique tailored blog/site. For this a non-hosted or self-hosted<br />

option is the way to go.<br />

46 https://www.tumblr.com.


28<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Self-hosted means you get your own hosting or a third-party paid site.<br />

Good examples of hosting sites include bluehost.com and hostgator.com.<br />

This costs around USD 4-5 per month, and provides your own unique<br />

domain name (URL), for example www.sawtna.net. Independent hosting<br />

accounts give you total control and freedom to design and manage your<br />

blog as well as access to a customized email (e.g., yourname@yourname.<br />

com). They also allow you to easily transform your blog into a website. With<br />

that power comes added complexity and the need to have basic HTML and<br />

web-design skills. Note that it is possible to buy a domain name and then<br />

map it to your platform-hosted blog.


CHAPTER 2<br />

Twitter<br />

TWITTER<br />

2


30<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CHAPTER 2<br />

Twitter<br />

This chapter includes an introduction to the<br />

micro-blogging social media platform Twitter. The<br />

uses of Twitter and the extent of its global reach<br />

are discussed, as well as how to link Twitter to<br />

other tools, such as websites/blogs and phones/<br />

smartphones. Twitter terminologies and signs are<br />

also explained.<br />

The highlight of this chapter is an interactive presentation with detailed<br />

steps on how to organize a successful social media advocacy campaign.<br />

This includes an explanation of social media analytical tools or social<br />

media metrics and how they can be used to measure the impact of digital<br />

campaigns.<br />

Turning to practical uses, we have an interview with renowned Sudanese<br />

cartoonist Khalid Albaih, who talks about how his passion for political<br />

cartoons blossomed and the different social media tools he uses to<br />

disseminate his artwork globally.<br />

Two case studies are presented, from Iran and Sudan. We look at the Iranian<br />

“Green Revolution” and how different stakeholders (opposition parties,<br />

citizens, and international media) used social media to share information<br />

and coordinate and mobilize protests, regardless of a massive government<br />

clampdown on independent media outlets during the 2009 Iranian elections.<br />

Additionally, the debate about “Twitter revolutions” is briefly discussed.<br />

From Sudan, the campaign launched by civil society and youth movements<br />

to free the prominent Nuba Mountains female detainee Jalila Khamis is<br />

discussed in depth. We unravel the tools the Sudanese civil society used<br />

to give visibility to Jalila’s unjust detention and the proceedings of her trial.<br />

From both the Iran and Sudan case studies we extract the lessons learned<br />

– what worked and what did not work.<br />

We wrap up by discussing a few useful social media applications that can<br />

be used to enhance your experience when using Facebook, YouTube,<br />

Instagram, Flickr, Google+ and others. They include Storify, Speak to Tweet,<br />

Flipboard, and BufferApp, among others.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 31<br />

A brief introduction to Twitter<br />

Twitter is a micro-blogging platform that allows a maximum of 140 characters<br />

to be posted. This can include links to articles, images and videos.<br />

Twitter was initially designed to ask a very simple question, “What are you<br />

doing?” to provide updates between friends. This is still the case, but like<br />

any digital tool, users are expanding the uses of Twitter to new dimensions<br />

different from the original purposes for which Twitter was designed.<br />

In most cases Twitter profiles are public and conversations are also public<br />

for all to see, unless you send messages to someone’s inbox as a direct<br />

message. In this case that person must follow you too.<br />

Twitter has more than 300 million active users globally and almost 1 billion<br />

registered users. If strategically used, it can help you receive very fast<br />

updates from your community of interest. (See the infographic on the next<br />

page for more Twitter statistics. 47 )<br />

TWITTER<br />

2<br />

Why use Twitter?<br />

• To spread messages fast: for public awareness campaigns and<br />

information-sharing.<br />

• To communicate with large audiences.<br />

• To follow or cover events in “real-time.”<br />

• To crowdsource for ideas or information. 48<br />

• To fundraise for campaigns.<br />

• To engage with your followers and non-followers.<br />

47 https://about.twitter.com/company.<br />

48 Crowdsourcing is defined as using the power of the internet to reach out to<br />

and/or mobilize citizens, in other words using the power of the “crowd” to get<br />

information that is often shared for free. On Twitter you can “crowdsource” by<br />

asking your followers a question on a certain topic and showing them how and<br />

where they can provide their inputs. For more on crowdsourcing see chapters 3<br />

and 4 of this guide.


32<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

How to gain followers on Twitter<br />

Twitter allows people to follow you based on their interests and the content<br />

of your tweets. Twitter has evolved into a community of people with specific<br />

interests.<br />

On Twitter you can follow people you do not know. You can even follow<br />

celebrities (artists, writers, politicians, actors).<br />

It is a powerful ICT tool, but it requires patience to build a community of<br />

followers. To gain followers you have to gain the trust of your “community of<br />

interest” by doing the following:<br />

1. Being authentic.<br />

2. Being accurate.<br />

3. Posting frequently.<br />

Twitter in numbers (2015)<br />


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 33<br />

Identifying influencers and new followers on<br />

Twitter<br />

Find and follow people whose Tweets interest you from the “Discover” tab on<br />

your phone Twitter application. Browse tailored recommendations on “who<br />

to follow” suggestions, find friends using your address book, or browse<br />

categories of popular accounts. Based on your interests and the people<br />

you follow, Twitter will also send you weekly suggestions of who to follow.<br />

Linking Twitter to other digital tools<br />

Twitter works best when linked to other digital tools. It should not be used in<br />

an isolated manner for advocacy campaigns. Its real power is in combining<br />

it with other social media channels, such as YouTube, your campaign or<br />

institutional Facebook page, blog and/or website and even your mobile<br />

phones!<br />

Linking Twitter to your website or blog<br />

Want to link from your website to your Twitter account?<br />

• Go to your Twitter account; then<br />

• Go to “settings;” then<br />

• Go to “widgets” and click on the button “create new.”<br />

• You will be taken to a page that says, “create a user widget.”<br />

• Here you are prompted to choose a timeline that is one of the following:<br />

your user timeline; tweets you have favored; specific lists you have<br />

created; or specific search based on a hashtag or topic. The most<br />

commonly used is the timeline, which will show all tweets you tweeted,<br />

retweeted and responded to.<br />

• When you make your choice press “create widget.”<br />

• An HTML code will appear that you will have to copy and paste in the<br />

appropriate location of your website’s source code.<br />

TWITTER<br />

2


34<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong>


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 35<br />

Linking Twitter to your phone<br />

For smartphones<br />

Given Twitter’s importance in capturing breaking news and events in realtime,<br />

it’s no surprise that up to 80 percent of Twitter users tweet from their<br />

mobile phones.<br />

To link Twitter to your smartphone simply download the Twitter application.<br />

For older generation cell phones<br />

To activate sending tweets via text messaging using an old generation cell<br />

phone (i.e., not a smartphone): 49<br />

• Go to your Twitter account (from your computer);<br />

• Go to “settings” and then “mobile;”<br />

• Indicate your “country” from the drop down menu;<br />

• Fill in your phone number;<br />

• Choose your telephone provider; and<br />

• Press the button “activate phone.”<br />

TWITTER<br />

2<br />

49 https://support.twitter.com/articles/14226-how-to-find-your-twitter-short-codeor-long-code.


36<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

If you are inside Sudan, start tweeting from your phone by sending texts to<br />

the short code 40404 (local texting fees will apply). This allows you to send<br />

and receive tweets.<br />

Note: at the time of writing this, the texting to Twitter service in Sudan, from<br />

old generation cell phones, had been discontinued by the local provider.<br />

Another option is to use long code, which allows only one-way tweeting,<br />

meaning that you cannot receive tweets. International tweeting rates may<br />

apply. The long codes are as follows:<br />

UK: +447624800379.<br />

Germany: +491724403473.<br />

Finland: +3584573950042.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 37<br />

Twitter terms and signs<br />

Twitter terms<br />

Tweet: A message of up to 140<br />

characters.<br />

Twitter feed: <strong>New</strong>s feed of Twitter<br />

messages by one user.<br />

Tweep: A Twitter user.<br />

Following: The friends, groups,<br />

organizations, campaigns, etc.,<br />

that you are following and receiving<br />

tweets from.<br />

Followers: “Fans” or friends who are<br />

following your tweets.<br />

Hashtags: Words prefixed by # that<br />

are similar to URL links; they help<br />

users interested in specific topics<br />

or keywords to find relevant tweets.<br />

They are searchable and useful for<br />

archiving conversations and as an<br />

organizational tool.<br />

<strong>New</strong>sfeed: Collection of new<br />

messages.<br />

Twitterverse: The realm of tweets<br />

and Twitterers.<br />

Popular Twitter signs<br />

@: <strong>Use</strong> this when addressing or<br />

replying to another Twitter user. Note<br />

that your conversation will be public<br />

or you will be introducing that person<br />

to others in your network.<br />

d: Signifies a direct private response.<br />

Others will not see this.<br />

#: This is a symbol for the hashtag<br />

that precedes a phrase or word as<br />

discussed under “Twitter terms.”<br />

RT: Stands for “retweet.” Comes<br />

before any tweet that you want to<br />

“retweet.”<br />

H/T: Hat tip, used for crediting<br />

another Twitterer for a thought or<br />

reference.<br />

#FF: The abbreviation for Follow<br />

Friday, an indication that you are<br />

recommending people to follow.<br />

#PT: Stands for “previous tweet” and<br />

indicates that you are writing a few<br />

related tweets.<br />

TWITTER<br />

2<br />

For more Twitter terminology visit Twittonary, an online Twitter dictionary that<br />

explains Twitter-related words: http://www.twittonary.com


38<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

How to organize a social media<br />

campaign<br />

In this section we take you through a step-by-step interactive presentation<br />

on how to organize a successful social media advocacy campaign.<br />

Below are the steps that we recommend you follow when you are planning<br />

a social media advocacy campaign:<br />

• Identify your objectives clearly so that they are SMART (specific,<br />

measurable, achievable, realistic and time-bound).<br />

• Collect or produce content to inform and educate others about your<br />

topic. This may require research to produce a report or producing a short<br />

compelling video or a collection of videos. Research all content and use<br />

it during the campaign as educational materials.<br />

• Prepare graphics such as a common profile or avatar that you want<br />

people to upload to spread the message.<br />

• <strong>Use</strong> a wide range of new-media tools and social media platforms<br />

to reach diverse audiences.<br />

To create a social media campaign through an online interactive<br />

presentation, follow the steps here: 50<br />

Prezi. Sawtna Digital. Steps for Preparing a <strong>New</strong>-media Advocacy<br />

Campaign.<br />

50 Prezi. Sawtna Digital. Steps for Preparing a <strong>New</strong>-media Advocacy Campaign.<br />

July 5, 2014.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 39<br />

• On Twitter create a hashtag that is catchy and short. Creating<br />

two hashtags in Arabic and English is important to widen the scope of<br />

the audience you are reaching. The Arabic hashtag will ensure that a<br />

Sudanese audience is part of the conversation and the English hashtag<br />

will inform an international audience, and especially the international<br />

media.<br />

• Have a media strategy. (1) Prepare Twitter handles for media outlets<br />

and organizations you want to target during the campaign (e.g., @NYT,<br />

@AJStream, @BBCArabic, @BBCWorld, @BBCAfrica, @alhurranews, @<br />

France24_Ar, @France24_en, @AlArabiya). (2) Have designated media<br />

spokespersons ready to address questions from journalists and to give<br />

media interviews upon request.<br />

• Have a team that will take shifts to tweet, engage with the public and<br />

respond to media requests.<br />

• Spread the word before you launch! Tweet heavily to bring attention<br />

to your campaign a few days beforehand. Create an announcement on<br />

your website or blog, with the essential information (what, why, where,<br />

when and how people can act), and circulate that link on multiple social<br />

media platforms.<br />

• Link your online action with on-the-ground activities and relevant<br />

partners. Make sure that you capitalize on any community outreach<br />

and/or organized events on the ground linked to the campaign’s theme,<br />

by spreading the campaign’s messages via offline activities, forums,<br />

flyers or newsletters, and partnering up with relevant groups.<br />

• Measure and evaluate impact. If you defined your objectives clearly,<br />

measuring impact will be easier. It is important to measure impact and<br />

evaluate the campaign in order to learn from successes and failures<br />

and improve future Twitter campaigns. Impact can be the short-term<br />

immediate outputs or the long-term outcomes. Some general indicators<br />

or short-term outputs could be: (1) Were you able to execute the<br />

campaign as planned? (2) Did you get any media requests, interviews<br />

and/or coverage? (3) Did the Twitter campaign generate a vibrant<br />

discussion? (4) How often was the designated hashtag tweeted and<br />

retweeted?<br />

TWITTER<br />

2


40<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Measuring impact: social media<br />

analytics and real-time tracking of<br />

online campaigns<br />

Private sector enterprises, governments and non-profits are starting to<br />

realize that their interactions on social media platforms generate a lot of<br />

useful data. This data can tell volumes about supporters, clients, investors<br />

and constituents, but only if it is centralized, organized and visualized to<br />

inform decision-making. There are many easy ways to use social media<br />

analytical tools that help with exactly that. Generally speaking, the social<br />

media metrics that can help us measure the impact of our social media<br />

strategies include: 51<br />

• Reach: number of followers and/or fans.<br />

• Engagement: number of mentions, likes, shares, tweets and retweets.<br />

• Referral traffic from website: amount of traffic coming to your website<br />

from social media and/or the top URL addresses bringing traffic into the<br />

website.<br />

• Monthly number of unique visitors and/or reads to your website<br />

and the comments generated are also important website metrics.<br />

• Share of voice: the percentage of mentions within a certain sector or<br />

profession.<br />

• Competitive score: where your competitors stand in terms of reach,<br />

engagement and share of voice.<br />

A word of caution: social media metrics can generate a lot of data/<br />

information that may not be useful to you. <strong>Social</strong> media analytics or metrics<br />

that are useful to you are those that are directly related to your end goals<br />

and objectives. Hence, feel free to discard metrics that are not useful. Also<br />

note that some metrics may be worth your attention more than others. For<br />

example, the high number of fans on your Facebook or Twitter pages may<br />

be less important than the actual number of fans who engage with you to<br />

help you spread your message by tweeting and sharing, and who respond<br />

to you through concrete action. 52<br />

51 Visual.ly. 5 <strong>Social</strong> <strong>Media</strong> Metrics That Won’t Slow You Down. June 25, 2013.<br />

52 GoodData. Marketing Metrics Overload: What Really Matters. May 6, 2013.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 41<br />

Twitter’s analytical tool<br />

Twitter has its very own analytical tool. To use it go to:<br />

• The toolbar at the top with your Twitter profile picture; then<br />

• Scroll down to “Analytics.”<br />

Through Twitter’s analytical tool you will get a detailed analysis of your Twitter<br />

account’s activity for the past 28 days that will include:<br />

• Tweets: Your total number of tweets in the last 28 days.<br />

• Tweet impressions: The total impressions or people reached (through<br />

tweets, retweets or mentions), including the percentage increase or<br />

decrease in impressions.<br />

• Profile visits: The total number of visitors to your profile, in addition to<br />

the percentage increase or decrease in profile visits.<br />

• Mentions: The number of times you received mentions.<br />

• Followers: Your total number of followers with an indication of how<br />

much that number increased or decreased.<br />

• Top tweet: The tweet that received the highest number of impressions<br />

and hence reached the highest number of people.<br />

• Top follower: Your most influential new follower; influence here is<br />

measured in terms of the number of his or her followers.<br />

TWITTER<br />

2


42<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Additional social media analytical tools<br />

Below are five social media analytic tools and a detailed discussion of what<br />

they offer.<br />

1. Topsy. 53 Topsy is a social media analytics tool that provides access to<br />

every tweet generated on Twitter, and also indexes social networks including<br />

Facebook and Google+. Topsy has created a complete searchable archive<br />

of the more than 300 billion tweets sent over Twitter since it was set up, and<br />

added other analytics tools to make itself useful to businesses – which can<br />

buy advanced services. Topsy also provides metrics for any term mentioned<br />

on Twitter via its free analytics service at analytics.topsy.com, where you can<br />

compare up to three terms for content in the past hour, day, week or month.<br />

2. TweetReach 54 and Keyhole 55 are two tools that help evaluate in great<br />

detail the impact of certain hashtags on Twitter, or the impact of a campaign<br />

or topic being discussed, by measuring: (1) the number of posts or tweets<br />

under a specific hashtag; (2) the number of users of a certain hashtag; (3) the<br />

reach or number of unique followers a user has, and hence how influential<br />

each user is; and (4) the impressions: the number of times a user posts.<br />

Keyhole works with Twitter, Instagram and Facebook; TweetReach works<br />

exclusively with Twitter. Both tools are free of charge and the analytics are<br />

tracked for 8 days at a time. They include visual data such as graphs, pie<br />

charts and histograms. However, to have more historic analytics dating back<br />

beyond 8 days, users have to upgrade to a pro-account that charges fees.<br />

Analytics by both TweetReach 56 and Keyhole 57 using the hashtag<br />

#SudanRevolts are illustrated in the screenshots below:<br />

53 http://topsy.com.<br />

54 http://tweetreach.com.<br />

55 http://keyhole.co.<br />

56 http://tweetreach.com/reports/9110423?v=2.<br />

57 http://keyhole.co/realtime/1E5x4w/SudanRevolts.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 43<br />

3. Klout 58 is a social media analytical tool that works with multiple social<br />

media platforms and ranks users’ internet influence based on the number<br />

of followers they have and how often posts are liked and retweeted. Klout<br />

defines “influence” in social media as “‘the ability to drive action’. When you<br />

share something on social media or in real life and people respond, that’s<br />

influence. The more influential you are, the higher your Klout Score.” The<br />

Klout Score ranges from 1 to 100 and is not static (this tool is free).<br />

4. ThinkUp 59 was used by the Obama administration in its beta<br />

(development) phase and is a social media analytics tool for Twitter,<br />

Facebook and Instagram that is open source and was launched in early<br />

2014. 60 It provides a group of dashboards and notification tools that tell<br />

you which tweets were your most popular, who your biggest fans are, and<br />

whether your posts tend to do better in the morning or in the afternoon,<br />

among other things. It also provides a searchable archive of your tweets<br />

and a handy way to reference responses to questions you have asked. It is<br />

not free, but it is affordable; fees range from basic membership to executive<br />

membership for companies.<br />

5. Crowdbooster 61 evaluates impact metrics and identifies users to follow.<br />

This gives in-depth analysis of public information or marketing campaigns<br />

as well as tips on how to improve outreach. This service is not free, but there<br />

is a 30-day trial period.<br />

TWITTER<br />

2<br />

58 http://klout.com/corp/how-it-works.<br />

59 https://www.thinkup.com/join.<br />

60 Wired Magazine. Klint Finley. Out in the Open: You too Can <strong>Use</strong> Obama’s Secret<br />

<strong>Social</strong> <strong>Media</strong> Weapon. October 14, 2013.<br />

61 http://crowdbooster.com.


44<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Interview with Sudanese cartoonist<br />

Khalid Albaih<br />

Khalid Albaih is best known for his political satire cartoons (dubbed<br />

Khartoons) that are one of the freshest and most talented artistic<br />

commentaries on Sudanese and Middle Eastern politics. Most are<br />

circulated on the internet and social media platforms. Khalid shot<br />

to prominence in 2011 at the height of the revolutions in the Arab<br />

world often referred to as the “Arab Spring.” His political cartoons<br />

resonated with protesters in Tahrir Square, predicted the evolution of<br />

the protest movement in the region and thoroughly followed events in<br />

the region, including in his native Sudan. To reach a global audience<br />

Khalid mainly used social media platforms such as Facebook,<br />

Twitter, 62 Tumblr, Flickr and Instagram. In this interview he talks to us<br />

about his journey and the power of social media in enabling artists<br />

with a social justice message.<br />

You can see Khalid Albaih’s cartoons on:<br />

● Facebook. 63<br />

● Flickr. 64<br />

● Instagram. 65<br />

● Tumblr. 66<br />

62 https://twitter.com/khalidalbaih.<br />

63 https://www.facebook.com/KhalidAlbaih.<br />

64 http://www.flickr.com/photos/khalidalbaih.<br />

65 http://instagram.com/khalidalbaih.<br />

66 http://khartoon.tumblr.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 45<br />

Q1. How did your passion for cartoons start? And how did it<br />

evolve to political cartoons?<br />

I was into art. I liked drawing ever since I was a kid. I remember<br />

tracing newspapers. And I was always into comics, and was reading<br />

comic books in Sudan when I first started to read in Arabic and<br />

English. There were all these comic books translated in Lebanon. I<br />

loved that, and I always wanted to be an artist.<br />

When we had to leave Sudan and come to Doha, my father used<br />

to buy two Egyptian cartoon-based magazines. One of them was<br />

Sabah El Kheir 67 and the other Rose al Youssef; 68 they are both very<br />

well-known Egyptian magazines. I loved cartoons. My dad would<br />

spend hours reading the magazine, and I couldn’t wait for him to<br />

finish it so I could take it and copy all the cartoons.<br />

Of course, like all the Sudanese “refugees” or diaspora, we all come<br />

from political backgrounds, with educated parents. My father was<br />

a diplomat, and when the revolution happened [in 1985], he had to<br />

leave like a lot of people, including my uncle who was a president<br />

at some point. So we come from a very political family. Growing up<br />

I heard a lot about Communists and Islamists; and al ingaz and Al<br />

Bashir.<br />

I loved cartoons, and how they put everything in a nutshell, with<br />

different styles, and they look amazing. Even if you are not into politics,<br />

it’s the first thing that you turn to see. If you read a daily newspaper<br />

you see the cartoon, and it’s probably relative to what society is<br />

going through at that time. I love the idea of it because most of my<br />

friends and the people I knew from my generation never really liked<br />

politics. Not that they didn’t like it, but they were told by their parents<br />

to keep away from it. Because, you know, “it’s very dangerous to be<br />

involved in politics, and it will stand in the way of your future to be an<br />

engineer or a doctor.” As you have to be of course!<br />

So [cartoons] was always the way to introduce the people around<br />

me to politics in a very fun and short way.<br />

People don’t read anymore; they went from reading books in my<br />

father’s generation to reading magazines, and now to just reading<br />

posts on Facebook and one-liners on Twitter. Now it’s even worse,<br />

they just want to see images on Instagram.<br />

The first political cartoon I did was during the student union elections<br />

in my university. I was at the meeting and every speaker was saying<br />

what the one before him said; it was the same thing ... they were all<br />

lying basically. So I used it for a cartoon and everyone loved it. And<br />

it went on from there.<br />

TWITTER<br />

2<br />

67 https://www.pinterest.com/pin/365284219745980492.<br />

68 http://www.rosa-magazine.com.


46<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

I wanted to become a professional cartoonist/artist, but of course<br />

being from the region you had to be an engineer or a doctor. So<br />

I studied interior design engineering because it had the word<br />

engineering in it.<br />

I came here [to Qatar], and started applying to newspapers. I<br />

had a job, but really wanted my cartoons to be published. In the<br />

cartoonists’ world, for your cartoons to be published, you have to<br />

be published, which doesn’t even make sense. I started applying<br />

everywhere, but nobody wanted my cartoons because, first of all, I<br />

didn’t have the name to put out such political stuff.<br />

Secondly, my cartoons looked different. And all the editors I was<br />

talking to were really old and had no connection to the youth. They<br />

had no idea what a computer was and were always sitting on huge<br />

desks with not one computer in sight, and big piles of paper.<br />

That was around the time the Arab Spring started and I was very<br />

upset. Bouazizi burned himself and I started a Facebook page. It<br />

was the same reaction we had all over the Arab world, and we had<br />

no choice but to be online, because it was the only place to speak<br />

freely and be understood by people your age from different regions. I<br />

started a Facebook page (to put my work on it), and with the help of<br />

my colleagues, word started getting around. When the Arab Spring<br />

happened, I started doing work about Tunisia, Egypt and then Libya<br />

– and it just spread.<br />

A lot of activists and civil rights movements used my work. And<br />

because it is free online, under a creative commons license, it really<br />

got a lot of views and got used in a lot spaces.<br />

Q2. Tell us about the moment you realized your cartoons have<br />

a regional or global audience beyond your native Sudan.<br />

There were a couple of moments. The first one is when I was<br />

contacted by a journalist in Brazil asking me if they could use my<br />

work because they saw it online. To me that was amazing. The<br />

biggest moment was when one of my friends stenciled my cartoon in<br />

Lebanon. Then, a day after, someone stenciled my cartoon in Tahrir<br />

Square, during the Egyptian revolution, three days before Mubarak<br />

stepped down. I remember doing the cartoon on Friday morning<br />

and by Friday night it had a lot of views and was shared widely – it<br />

went viral. When I got an image of my cartoon being used in Tahrir<br />

Square, I felt like I was part of the revolution.<br />

During that time, there was a lot of unity among the youth and<br />

everybody was cheering; the change has finally arrived. There were<br />

no borders as we were all brothers and all supporting each other. I<br />

thought it was amazing that I was part of that time and part of that<br />

narrative.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 47<br />

It was a cartoon called “Musir” 69 and it had Mubarak’s face with the<br />

word “musir” written next to it. “Musir” in Arabic is written with the<br />

same letters that are used for “Masr,” which is the Arabic name for<br />

Egypt, but with different vowel marks. It translates to “determined” or<br />

“insisting.” This was three days before Mubarak stepped down, so it<br />

implied that he was insisting to stay.<br />

Q3. Your cartoons and your message would not have reached<br />

a global audience if not for your strategic use of ICTs. Can you<br />

tell us how you specifically used social media to expand your<br />

reach as an artist and cartoonist?<br />

When I first started posting my cartoons I posted them on Hi5 ... it<br />

was the introduction to social networking for us. After that Facebook<br />

started getting popular, and I was already on Facebook. Before my<br />

official page 70 I started posting on my personal page, 71 and people<br />

liked them. At the beginning of the Arab Spring I was interested<br />

in Twitter because I read a lot of news and “Twitter feeds” were<br />

mentioned a lot since Tunisians were using Twitter a lot. Like most<br />

people I had an account but I wasn’t using it. Then I starting using<br />

my Twitter 72 account and little by little I started to like it.<br />

TWITTER<br />

2<br />

The reason I specifically liked Twitter among all the social media tools<br />

was the one-to-one dialogue. It didn’t matter who the person was,<br />

you could communicate with them personally – you could speak<br />

to the journalists, you could speak to the newspapers, you could<br />

speak to the magazines, you could speak to whoever is running<br />

that account. In general that is what marketing 2.0 is all about, the<br />

emotional one-to-one connection. That is where I get a lot of advice<br />

on my cartoons. People write comments and I always read the<br />

comments and reply back. You see the dialogue among people as<br />

well. Some people with, some people against, as well as those who<br />

say it will never work out. I am always excited to see the comments.<br />

I then started to use Tumblr. 73 I tried to follow the trends and go to<br />

where the people are, because this is what you have to do now<br />

[in order to make it]. However it is extremely hard to be exclusively<br />

online, because you are at the mercy of the scroll of the thumb,<br />

because people usually view these things on their phones. There<br />

is a lot of junk on the internet, but there is also a lot of amazing<br />

things, so I try to make my cartoons as visually pleasing as possible.<br />

I know that I have five seconds to grab that person’s attention and<br />

tell them about the message that I want to give. I try to make the<br />

69 Flickr. Khalid Albaih. Museer Graph. February 2, 2011.<br />

70 https://www.facebook.com/KhalidAlbaih.<br />

71 https://www.facebook.com/albaih.<br />

72 https://twitter.com/khalidalbaih.<br />

73 http://khartoon.tumblr.com.


48<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

cartoons simple and I try to get the [complete] message through in<br />

five seconds.<br />

Q4. It seems that you’re saying that there is not one social<br />

media tool that works best, and that a combination is the best<br />

way to reach a diverse group or audience.<br />

Exactly. Look at the Chinese now. They are using WeChat 74 instead<br />

of WhatsApp, 75 and now they are switching to Kik. 76 It’s all about<br />

these new things that are happening, and it’s all about what’s in<br />

fashion now – what are most people using? What are the young<br />

people using? What are the professional people using?<br />

Q5. What advice would you give someone to convince them<br />

to try Twitter, for example?<br />

It took people about five years to get used to Facebook and<br />

understand what it is. As I said it’s all about what’s in fashion right<br />

now. For the average person there is no fun in using Twitter. For<br />

journalists and activists I would suggest to them opening a Twitter<br />

account because that is where all the other activists and journalists<br />

are. This is where you become a citizen journalist, and this is where<br />

your views are seen. You’re trying to reflect what is going on in your<br />

country and this is the best way to do it right now. If you are an artist<br />

or an activist and you want to get your work out there, this is the<br />

best route.<br />

Q6. What about Tumblr? A lot of people blog but fewer people<br />

are familiar with Tumblr because it is something, as you said,<br />

fashionable with the artistic community.<br />

I personally love Tumblr. If I am not in the mood for politics, Tumblr is<br />

more fun for me because it is very creative. There are a lot of artists<br />

on Tumblr and there is an award now for artists on it.<br />

It’s a blogging platform, mostly used by visual artists. It is hands<br />

down the easiest way to make a blog. You just register and you can<br />

have a blog in your name, and you can reblog from anywhere. You<br />

get to follow a lot of people and they follow you back, and there are<br />

a lot of creative people on it.<br />

74 http://www.wechat.com/en.<br />

75 http://www.whatsapp.com.<br />

76 http://kik.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 49<br />

interest graph<br />

a community based<br />

on interests<br />

social graph<br />

a community based on<br />

personal relationships<br />

allows<br />

one-way<br />

following<br />

based on<br />

two-way<br />

friending<br />

private<br />

public<br />

by default<br />

Why do I need Twitter if I have Facebook?<br />

The interest graph vs. the social graph<br />

Many of you might be thinking, “Why should I bother with Twitter when I<br />

have Facebook?” Here we will tell you why, and point out the differences<br />

between Twitter and Facebook.<br />

Although Facebook in the last few years has copied some features from<br />

Twitter, such as allowing the use of hashtags and introducing a “follow”<br />

button, where you can follow those who are not your “friends,” Twitter still<br />

remains fundamentally different from Facebook.<br />

The main difference is that Twitter is about building a “community of interest”<br />

(what is referred to as the interest graph), as opposed to maintaining contact<br />

with an existing community of friends, family and acquaintances (the social<br />

graph or a detailed map of personal relationships). 77<br />

TWITTER<br />

2<br />

Digging deeper, Twitter’s interest graph: 78<br />

• Allows one-way following as opposed to two-way friending. You can<br />

follow and interact with anyone, be it a journalist, a politician or a celebrity.<br />

• Builds a network around shared interests and not personal<br />

relationships. You can have many areas of interest.<br />

• Is public by default not automatically private. Tweets are public<br />

unless they are sent to someone’s inbox, in which case that person has<br />

to follow you back.<br />

• Is about what you want to be and not what you were.<br />

This makes Twitter ideal for advocacy because it is possible to get the<br />

attention of international journalists, TV stations and global communities who<br />

care about the same issues, as long as credible content and information are<br />

communicated to get their attention and build their trust.<br />

77 http://en.wikipedia.org/wiki/<strong>Social</strong>_graph.<br />

78 http://techcrunch.com/2010/10/16/why-twitter-is-massively-undervaluedcompared-to-facebook.


50<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

A supporter of defeated Iranian presidential candidate Mir<br />

Hossein Mousavi during riots in Tehran on June 13, 2009.<br />

CASE STUDY 2: IRAN<br />

Citizen journalism during Iran’s<br />

“Green Revolution”<br />

If there was one event that forecasted the Arab Spring, then it must<br />

have been Iran’s “Green Revolution” in 2009. This case study looks at<br />

the Iranian “Green Revolution” and the use of Twitter, Facebook and<br />

YouTube to share a national struggle (within a very closed country) with<br />

an international audience. We will analyze how different digital tools<br />

were used by the political opposition and by Iranian citizens; then we<br />

delve into the debate surrounding “Twitter revolutions.”<br />

It is noteworthy to mention that Iranians had been defying their regime<br />

for many years before this event. As of 2008, the Iranian blogosphere<br />

was the fourth largest blogosphere in the world with almost 60,000<br />

regularly updated blogs. The Iranian blogosphere included the presence<br />

of both the conservative and the more liberal and secular political<br />

activists, who were using blogging as a way to counter the extremely


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 51<br />

repressed local media and the limited freedom of speech. 79 The Iranian<br />

“Green Revolution” was hence mostly characterized by: 80<br />

● A rigged national election that generated public outrage.<br />

● The absence of international media who were kicked out by the<br />

regime before the riots.<br />

● Massive “marches” or protests in all of Iran’s main cities. The first three<br />

or four protests were peaceful and very symbolic with supporters of<br />

opposition leader Mousavi wearing green. Some estimates of the<br />

June 16, 2009 demonstration in Tehran say that seven million people<br />

showed up (almost half of Tehran’s population).<br />

● To stop the spread of protests the government arrested the<br />

opposition and targeted civilians.<br />

● Regardless of all, the world and international media outlets got<br />

detailed and up-to-date footage covering the protests and the<br />

violence that followed.<br />

<strong>Social</strong> media tools were used for different purposes by the Iranian<br />

opposition parties and by Iranian citizens.<br />

● Opposition leaders used both Facebook and Twitter in a centralized<br />

fashion as an organizing tool, to announce the time and location<br />

of protests and coordinate the movements of their supporters. But<br />

word of mouth and mobile SMS were also used by supporters to<br />

spread the word. Mousavi had more than 65,000 supporters in his<br />

Facebook group and every message reached this army of people<br />

directly. Supporters were also asked to pass the message to others,<br />

implying that the political leaders deliberately made use of their<br />

supporters’ online and offline personal networks.<br />

● Citizens used mostly their mobile phones to take pictures that were<br />

then transmitted to the world via YouTube, Twitter and Facebook.<br />

(See some images here: http://bo.st/fdUMm. 81 ) Iranians used Twitter<br />

as an important broadcast (rather than organizing) tool to report<br />

events, slogans, and minute-by-minute protest movements – that<br />

covered events in real-time. In this way, the strategic use of<br />

digital tools by Iranian citizens turned a local struggle into a national<br />

and international one.<br />

● The international media used the same videos provided by citizens<br />

in their coverage of Iran. A journalist from the BBC (the network was<br />

banned from Iran) commented on the inflow of information coming<br />

TWITTER<br />

2<br />

79 Bruce Etling and John Kelly. Mapping Iran’s Online Public: Politics and Culture<br />

in the Persian Blogosphere. Berkman Center for Internet and Society at Harvard<br />

University. April 2008. PP. 2 and 5.<br />

80 Sudan Tribune. Dalia Haj-Omar. What can Sudan learn from Iran’s Green Revolution?<br />

June 29, 2009.<br />

81 http://bo.st/fdUMm.


52<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

● from Iranian citizens by saying, “the days when regimes can control<br />

the flow of information are over.”<br />

Another lesson to take away from the Iranian experience is that it is<br />

usually the use of several digital tools and not the reliance on one or two<br />

tools that works best to get the word out.<br />

The debate around “Twitter revolutions:” Is digital<br />

activism enough to make revolutions happen?<br />

After the Iranian “Green Revolution” of June 2009, the term “Twitter<br />

revolution” was coined to describe what happened in Iran. 82 While the<br />

inventors of Twitter might have been happy for the positive press they<br />

got for enabling and empowering this national protest that captured<br />

the world’s imagination (because it initially lacked violence and was<br />

happening in one of the most repressive countries), social movement<br />

theorists and internet sociologists were quick to point out that social<br />

media are just tools and that calling them catalysts of a revolution was<br />

far fetched, ignoring and discrediting the courage of citizens who risked<br />

their lives, as well as the social networks and organizing that existed<br />

long before these digital tools came into being. 83<br />

Political scientists analyzing the role of technology in “political activism,<br />

movement activism or issue activism” often remind us that digital<br />

activism is “primarily activism,” where a group of people are working<br />

together for a common goal, and that technology does not and will not<br />

answer for us the traditional questions, of:<br />

● How do we recruit?<br />

● How do we coordinate and organize actions?<br />

● What is our main objective?<br />

● How will we reach that objective?<br />

● Who are our opposition/enemy and how will we confront them?<br />

Digital tools have the potential to make the process of political advocacy<br />

more participatory. It is therefore how we use these tools and not the<br />

tools themselves that determine success or failure. The reality is that<br />

digital tools have been revolutionized by activists who used them<br />

creatively to serve the social change agenda. <strong>Social</strong> change was not<br />

the original intention of the inventors of either Facebook or Twitter.<br />

So in this sense it is activism that has empowered or “enabled” the<br />

technology and not vice versa.<br />

82 Zero Anthropology. Maximilian Forte. America’s Iranian Twitter Revolution. June<br />

17, 2009.<br />

83 Slate. Jack Shafer. Doubting Twitter: Let’s not get carried away about its role in<br />

Iran’s demonstrations. June 17, 2009.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 53<br />

CASE STUDY 3: SUDAN<br />

Revisiting the offline and digital<br />

campaign for Nuba Mountains<br />

detainee Jalila Khamis<br />

Between mid-March 2012 and January 2013, Jalila Khamis (a teacher<br />

and mother of five) was Sudan’s most prominent female political<br />

detainee from the Nuba Mountains. She was kidnapped by Sudanese<br />

national security agents from her house in the early hours of March<br />

16, 2012 in her nightgown and imprisoned for nine months without<br />

charge. 84<br />

Jalila’s “crime” was that she was providing shelter in her home and<br />

seeking aid for a large number of internally displaced persons (and<br />

family members) fleeing the newly erupted conflict in the Nuba<br />

Mountains. She was also speaking out about the horrors and shelling<br />

sustained by the civilian population of the Nuba Mountains to Sudanese<br />

civil society and the diplomatic community in Khartoum. This included a<br />

video testimony recorded by Nagla’a Sid Ahmad, Sudan’s most prolific<br />

video blogger at the time. 85<br />

During the course of the following months, Jalila’s lawyers struggled to<br />

gain proper access to the details of her case. 86 There was unconfirmed<br />

news that Jalila was facing possible charges that included “undermining<br />

the constitution,” “spreading false information,” “inciting hatred” and<br />

“spying” for foreign entities. These charges, if confirmed, could carry the<br />

death penalty. Jalila was told verbally of these charges by the National<br />

Security and Intelligence Services (NISS), and that her video testimony<br />

on YouTube was used as the main evidence against her.<br />

Jalila’s lawyers were resistant to demands by Sudanese civil society<br />

and youth movements to launch more aggressive advocacy and/or<br />

media campaigns demanding that Jalila be charged immediately and<br />

receive a fair and transparent trial or be released. Her lawyers were<br />

under the impression that media exposure and campaigning would<br />

harm her case.<br />

Regardless of this, Sudanese women activists and youth movements<br />

refused to let Jalila’s case disappear into oblivion. They kept blogging<br />

about Jalila and spoke to the international media and international<br />

TWITTER<br />

2<br />

84 Girifna. Nuba Mountains Female Activist Arrested. March 18, 2012.<br />

85 YouTube. Girifna TV. Jalila Khamis and the Nuba people. November 1, 2012.<br />

86 Girifna. Trial of Rights Activist Jalila Khamis Shrouded in Secrecy. August 24,<br />

2012.


54<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

human rights organizations to ensure that her case got coverage. They<br />

also kept in close contact with her family. 87<br />

The turning point came in November 2012, when women’s rights<br />

activists and the Girifna movement coordinated a silent protest (in front<br />

of Omdurman women’s prison) with an online campaign. The social<br />

media campaign was synchronized on Twitter and Facebook, with the<br />

English and Arabic hashtags #Jalila8Months and ‏.شهور_يا_جليلة‎#8‎ A<br />

large number of people on both Facebook and Twitter changed their<br />

profile pictures to Jalila’s picture and dedicated their status updates to<br />

demanding justice for her. 88<br />

87 Foreign Policy. Christian Caryl. An Idealist on Death Row. October 3, 2012.<br />

‏.شهور_يا_جليلة‎#8‎ 88 Girifna. Join Girifna’s Campaign for Jalila #Jalila8Months<br />

November 7, 2012.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 55<br />

The social media campaign attracted considerable international<br />

media coverage. Global Voices covered the campaign, summarizing<br />

the Twitter discussion under the #Jalila8Months hashtag. 89 Open<br />

Democracy ran an article by an anonymous Sudanese activist, who<br />

detailed the hardships of Jalila’s detention including her four months in<br />

solitary confinement. 90 Osman Naway, an outspoken Nuba Mountains<br />

activist, wrote an article about Jalila’s unjust detention, highlighting the<br />

plight of the Nuba people and the violations committed by the regime<br />

in Khartoum against populations of the periphery. 91 And the Egyptian<br />

ONTV ran a full episode on the situation of human rights on Sudan<br />

starting with Jalila’s story and focusing on violence against women. 92<br />

Shortly after the online campaign, Jalila was summoned and told<br />

that she was to stand trial on December 13, for the first time since<br />

her imprisonment. 93 To mark nine months into her detention, a video<br />

was made by an activist, in which her family recounted their personal<br />

suffering because of her absence, especially that Jalila was the main<br />

breadwinner for the family as well as a mother and a wife. 94 This rich<br />

documentation gave Jalila unprecedented popularity and support in<br />

Sudan and internationally – she was no longer an anonymous, faceless<br />

detainee. She was a mother, teacher, wife and above all a champion of<br />

peace and justice for the people of the Nuba Mountains.<br />

With all the charges Jalila received verbally from NISS now confirmed,<br />

the stakes were high. The Sudanese regime banned any coverage<br />

of Jalila’s trial in the print media and delayed the trial several times.<br />

Nonetheless, the trial was closely watched and documented online by<br />

journalists, activists, video bloggers and other citizens. This collective<br />

of supporters made sure that every single detail and failing of the<br />

Sudanese justice system was circulated on social media and by word<br />

of mouth. Jalila’s court sessions were heavily attended (including heavy<br />

attendance by NISS), to the extent that there was often no place to sit. 95<br />

TWITTER<br />

2<br />

89 Global Voices. Maha El-Sanosi. Sudan: Nuba Mountains Activist Detained for 8<br />

Months. November 11, 2012.<br />

90 Open Democracy. Anonymous. Jalila Khamis: the high price of courage.<br />

November 8, 2012.<br />

91 AllAfrica. Osman Naway. Sudan – Race-Based Violence and Torture. November<br />

8, 2012.<br />

92 YouTube. ONtvLIVE. Sudan: Violation of Rights and Torture in Prisons. (In Arabic.)<br />

November 20, 2012.<br />

93 Girifna. Today Jalila Enters her 9th Month! December 15, 2012.<br />

94 Girifna. Video: Jalila Khamis’s family tell her story. December 17, 2012.<br />

95 Girifna. Summary of Jalila Khamis’s Court Session, Dec. 23, 2012. December<br />

28, 2012.


56<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Live updates from the trial were posted to Facebook and Twitter,<br />

prompting NISS to allow only journalists in the remaining court sessions.<br />

But even this step to limit attendance did not stop journalists like Amal<br />

Habani 96 from updating their Facebook pages with details. Moreover,<br />

Amnesty International issued a statement requesting that “fabricated<br />

charges” against Jalila be dropped and the European Union sent a<br />

representative to attend the trial. 97<br />

All this public pressure finally paid off when, on January 20, 2013,<br />

the prosecutor formally closed Jalila’s case declaring lack of sufficient<br />

information. Jalila was charged with disseminating false information, but<br />

the 10 months she spent in prison were deemed sufficient punishment<br />

and she was released immediately amidst celebrations in her honor by<br />

civil society, her family and neighbors. 98<br />

96 http://www.girifna.com/7489.<br />

97 Amnesty International. Sudan: Fabricated charges against Sudanese teacher<br />

must be dropped. January 16, 2013.<br />

98 Girifna. Video: Jalila Khamis is Free! January 21, 2013.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 57<br />

What Sudanese activists are<br />

learning from digital campaigns for<br />

political detainees<br />

The success of the campaign to free Nuba Mountains political detainee<br />

Jalila Khamis was not unique. The experience of Sudan’s civil society and<br />

youth movements, who have campaigned tirelessly for detainees since<br />

2009, shows that there are a few key elements of success such as:<br />

• The more visibility the better. Keeping the story of a detainee in the<br />

public sphere ensures their protection, contrary to what many lawyers<br />

and family members may think.<br />

• Video testimonies from family members are a game changer.<br />

Videos of mothers and/or families of detainees testifying and pleading for<br />

their support tend to circulate much faster than written statements. They<br />

also give a human element to the suffering endured by the families and<br />

by those in detention. It’s all about telling the story and telling it genuinely.<br />

• For long-term detainees frequent updates and documentation<br />

are necessary. These can be in the form of brief statements or opeds,<br />

preferably in Arabic and English, so that they capture local and<br />

international attention.<br />

• Using multiple new media tools to target diverse audiences is<br />

key. <strong>Use</strong> all the media tools at your disposal because each tool will target<br />

a different audience. In the Sudanese new media ecology, Facebook<br />

will target Sudanese citizens while Twitter will more likely target the<br />

international media; and satellite TV will capture the Middle East region,<br />

including Sudanese citizens inside Sudan and Sudanese communities in<br />

the diaspora.<br />

• Link your online campaigns with action on the ground and request<br />

concrete action from your supporters, such as changing their profile<br />

picture to raise awareness and/or attending an ongoing trial of a detainee<br />

or a planned solidarity stand.<br />

• When detainees are freed, remember to celebrate and to collect<br />

their testimonies in order to help assess their post-detention needs and<br />

expose the regime’s maltreatment.<br />

TWITTER<br />

2


58<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Some useful social media<br />

applications<br />

Below are applications that can boost your social media experience. Some<br />

of them work with a number of social media platforms such as Twitter,<br />

Facebook, YouTube, Instagram, Flickr, Google+ and others. However, this is<br />

not a comprehensive list of social media applications. We will be discussing<br />

others in later chapters.<br />

• Storify 99 can curate stories using content from Twitter, Facebook,<br />

YouTube, Instagram, Flickr and others. It is a great way to amplify and/or<br />

curate a Twitter campaign or a critical event for documentation and share<br />

with those not on social media, or who were not part of the conversation<br />

or were not following the event closely. Here’s an example of a Storify<br />

that captured a campaign on Sudan’s Public Order Law that took place<br />

in September 2013. 100<br />

• Speak to Tweet. 101 This is ideal in situations where the internet is not<br />

working and people need to communicate and share news urgently.<br />

“Speak to Tweet” allows you to call a number to record a message that<br />

is then tweeted on the web. (To see and hear those tweets go to: http://<br />

twitter.com/speak2tweet.) This feature was used for the first time during<br />

the Egyptian revolution when the Mubarak regime shut down access to<br />

the global internet for a few days. 102 Similarly, a “Speak to Tweet” account<br />

was also set up for Sudan during #SudanRevolts when there were fears<br />

that the Sudanese government might cut the internet; it was reactivated<br />

after the Sudanese government shut down the internet for 24 hours on<br />

September 25, 2013.<br />

99 http://storify.com.<br />

100 Storify. Sudan’s #PublicOrderLaw Back in the Spotlight. September 2013.<br />

101 https://twitter.com/speak2tweet.<br />

102 http://googleblog.blogspot.com/2011/01/some-weekend-work-that-willhopefully.html.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 59<br />

• BufferApp 103 lets you schedule tweets and create a buffer that will be<br />

automatically posted. This is ideal for online newspapers with a lot of<br />

new daily content and limited staff dedicated to tweeting. It also shares<br />

content from Facebook, LinkedIn and Google+ and allows an invited<br />

team of users to access one account, hence ideal for institutions.<br />

• Thunderclap. 104 This great app for online advocacy campaigns calls<br />

itself a “crowd speaking” platform. It was first used by the Obama<br />

administration to speak out for gun control. Since then it has been used<br />

by many. Thunderclap permits users to leverage the power of their<br />

Twitter followers and Facebook friends by asking them to donate their<br />

tweets and Facebook status updates to a cause. If they agree, there<br />

will be a synchronized blast of tweets and Facebook posts to create<br />

attention. To start, open an account on the Thunderclap page, create a<br />

short message that you want others to share, and invite your network to<br />

support you. The platform has analytics to help users track in numbers<br />

the level of support generated.<br />

• Wefollow 105 is a directory of prominent people on Twitter organized by<br />

interest or theme.<br />

• Trendsmap 106 tells you what topics and hashtags are most trendy by<br />

geographic region.<br />

• Bitly 107 shortens long URL links. Most useful for use with Twitter.<br />

• Paper.li 108 can be used with Twitter and Facebook to turn RSS feed into<br />

an online newspaper that is customized by topics or themes.<br />

• Flipboard. 109 Mainly for use on smartphones and tablets, this app takes<br />

content from your social media account, such as Twitter and Facebook,<br />

and turns it into an easy-to-view magazine. You can also customize and<br />

produce your own magazines based on specific themes. Download it<br />

from the Google or Apple stores.<br />

• TweetDeck 110 /Hootsuite 111 /Tagboard. 112 These are dashboards for<br />

managing multiple social media accounts and useful for creating analytics<br />

and reports. Hootsuite also archives hashtags or other Twitter searches.<br />

TWITTER<br />

2<br />

103 http://bufferapp.com.<br />

104 https://www.thunderclap.it/?locale=en.<br />

105 http://wefollow.com.<br />

106 http://trendsmap.com.<br />

107 https://bitly.com.<br />

108 http://paper.li.<br />

109 https://flipboard.com.<br />

110 http://www.tweetdeck.com.<br />

111 https://hootsuite.com.<br />

112 https://tagboard.com.


60<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

• Twestival 113 is a global movement of volunteers using social media to<br />

mobilize communities for a one-time charitable event in support of a<br />

cause they care about. All events are 100 percent volunteer-run and 100<br />

percent of the proceeds from ticket sales and donations go directly to a<br />

charitable project.<br />

• Unroll.me. 114 This app cleans unwanted clutter from your email,<br />

especially newsletters and email lists you are subscribed to. After signing<br />

in, it identifies all your subscriptions and gives you the option to subscribe<br />

or “roll” subscriptions into one email that you receive periodically.<br />

113 http://www.twestival.com.<br />

114 https://unroll.me.


CHAPTER 3<br />

Crisis mapping<br />

CRISIS MAPPING<br />

3


62<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CHAPTER 3<br />

Crisis mapping<br />

This chapter introduces readers to basic concepts<br />

related to crowdsourcing with a focus on crisis<br />

mapping. Another form of crowdsourcing,<br />

crowdfunding, is discussed in chapter 4. After<br />

a brief introduction to the practical applications<br />

of crisis maps in different sectors, geographic<br />

locations and situations, we take a look at the<br />

Ushahidi platform and explain what it has to offer<br />

and how it has evolved.<br />

We will then explore a number of other crisis mapping tools that have<br />

emerged in recent years. Top challenges facing crisis mappers are then<br />

addressed and some emerging solutions are proposed.<br />

This discussion on crisis mapping is supplemented with three expert<br />

interviews that include a talk with crisis mapping expert, Helena Puig Larrauri,<br />

who speaks about the lessons crisis mappers are learning in Sudan, the<br />

challenges they are facing and the technical skills and resources required<br />

to use the technology. We then move to Egypt to learn how crisis maps are<br />

being used to combat violence against women via the HarassMap project,<br />

which has now been replicated in other countries. We also spoke to Fareed<br />

Zain, an engineer who pioneered the first use of crisis mapping in Sudan<br />

during the 2010 elections. He spoke to us about his experience and the<br />

lessons learned from that first utilization of the Ushahidi platform in Sudan.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 63<br />

Crowdsourcing: definitions and<br />

practical uses<br />

Crowdsourcing is the term utilized to describe using the power of mobile and<br />

web technologies to reach out to and/or mobilize citizens; in other words,<br />

using the power of the “crowd” to get information that is shared, most<br />

often, for free or to get people to act – all in real-time. Those participating<br />

can be offering knowledge, skills or information, or even donating things.<br />

Crowdsourcing can also take the form of mining data or using readily<br />

available information on a specific topic or event that is produced voluntarily<br />

by users of a social media network such as Twitter or Facebook.<br />

Crowdsourcing has therefore been described as “a form of universally<br />

distributed intelligence, constantly enhanced and coordinated in real-time,<br />

that results in the effective mobilization of skills.” 115 It has been used by<br />

citizens, journalists and citizen journalists, governments and policy-makers,<br />

as well as businesses 116 gathering ideas for solutions or innovations,<br />

amongst many other uses.<br />

Perhaps one of the first professions or sectors to make use of the huge<br />

amount of user-generated content on social media was journalism. For<br />

example, during the 2009 Gaza war, Al Jazeera Arabic and English used a<br />

Ushahidi platform to crowdsource information about casualties because it<br />

was too dangerous for journalists to gain access to the Gaza Strip. Al Jazeera<br />

English and other media outlets also played a major role in amplifying the<br />

diverse voices of citizens during the Arab Spring revolts by capturing in realtime<br />

digital news collected from citizens who were witnessing events on the<br />

ground and sharing the information on social media platforms. Al Jazeera<br />

then posted that information on its blog, as well as integrating it with more<br />

in-depth news and verified analysis. 117<br />

CRISIS MAPPING<br />

3<br />

Crowdsourcing has also been used to support more practical citizen<br />

participation. An example of how governments crowdsource information<br />

from citizens to fix service-related problems is a US-based platform and<br />

phone application called SeeClickFix. 118 This application encourages<br />

citizens living in towns and cities to report problems linked to service<br />

delivery or infrastructure directly to their local administrators or Department<br />

of Public Works. By simply logging through their phones, residents can<br />

send a description of the problem, and its location, supplemented with<br />

photos. When a request is submitted, a confirmation number is sent to<br />

115 Tanja Aitamurto. Crowdsourcing for Democracy: A <strong>New</strong> Era in Policy-Making.<br />

Publication of the Committee for the Future. January 2012. P. 8.<br />

116 http://www.innocentive.com.<br />

117 Philip N. Howard and Muzammil M. Hussain. Democracy’s Fourth Wave? Digital<br />

<strong>Media</strong> and the Arab Spring. Oxford University Press. 2013. P. 100.<br />

118 http://seeclickfix.com.


64<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

the citizen and to the appropriate department and the request is placed<br />

in SeeClickFix’s database, which also eliminates duplicate requests. When<br />

the issue is resolved, its status is updated and posted. Citizens can submit<br />

requests in several languages and requests can be anonymous.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 65<br />

Crisis mapping: a basic<br />

introduction<br />

Perhaps one of the most prominent crowdsourcing tools to emerge in<br />

the last few years has been Crowdmapping – also called crisis mapping.<br />

Crowdmapping refers to gathering information from witnesses on a specific<br />

issue or mining readily available information generated by users on social<br />

media. Its uses have included the mapping of displacement of citizens during<br />

environmental crises, government corruption, sexual harassment of women,<br />

and election monitoring or fraud, among other things. The information is<br />

communicated by participants to a map, by sending a text message (SMS)<br />

through their cell phones or a tweet, or by visiting the website where the<br />

map is hosted and inputting the information on a form there.<br />

Crowdmapping is a compelling tool that visually illustrates the scope and<br />

spread of a certain phenomenon or crisis, and is often followed by extending<br />

help to those in need or introducing the necessary policy measures or<br />

solutions. 119<br />

Although crowdmapping is often compared to geographic information<br />

systems (GIS), it goes a step further than just visually presenting, analyzing<br />

and managing data on a map, to capturing a broader set of tasks that allow<br />

the filtering and categorizing of information. 120 For example, if your map is<br />

tracking the sexual harassment of women, you can search by location or<br />

type of attack as well as extract any media or multimedia coverage during<br />

a certain period of time. Some open source mapping platforms allow<br />

collaborative updates of maps, meaning that community volunteers can<br />

interact with and update maps directly.<br />

CRISIS MAPPING<br />

3<br />

119 Tanja Aitamurto. Crowdsourcing for Democracy: A <strong>New</strong> Era in Policy-Making.<br />

Publication of the Committee for the Future. January 2012. P. 10.<br />

120 The Conversation. Marta Poblet and Pompeu Casanovas. Crowdsourced crisis<br />

mapping: how it works and why it matters. May 15, 2012.


66<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Some videos to watch<br />

Video explaining what Ushahidi is, how it works and how it has been<br />

deployed worldwide. 121<br />

TED talk with social media guru Clay Shirky: How cognitive surplus will<br />

change the world. 122<br />

TED talk by Erik Hersman: How texting helped Kenyans survive crisis. 123<br />

Where it all began: Ushahidi<br />

Ushahidi, which means “testimony” in Swahili, is the most popular open<br />

source crowdmapping platform. 124 It is where the story of crisis mapping<br />

began as an experiment by a group of bloggers during the post-election<br />

violence in Kenya in 2007. The aim was to “map incidents of violence and<br />

peace efforts throughout the country based on reports submitted via the web<br />

and mobile phones.” 125 At the time, one of Kenya’s most famous bloggers,<br />

Ory Okolloh, began blogging about the violence, which was not covered by<br />

the local media. 126 She was soon overwhelmed with information from her<br />

readers and suggested that a Google map be set up so others could update<br />

it collaboratively. A group of other African bloggers and technologists read<br />

her request and decided to act upon it, leading to the creation of Ushahidi.<br />

Ushahidi allowed even the least connected Kenyan citizens to send reports<br />

via SMS, after an SMS short code was created with the telecommunications<br />

company Safaricom. 127 The map that was created helped Kenyans keep<br />

track of what was happening, report violence, request help and avoid<br />

dangerous areas. It was also used by relief agencies, such as the United<br />

Nations, which were providing support to victims.<br />

Since then the Ushahidi platform has been used by millions in over 100<br />

countries around the globe, and most of its data is crowdsourced from<br />

the public using social media and SMS. Ushahidi is now an international<br />

organization that defines itself as one that, “build[s] tools for democratizing<br />

information, increasing transparency and lowering the barriers for individuals<br />

to share their stories,” as well as “a disruptive organization that is willing<br />

121 Vimeo. What is the Ushahidi Platform? 2010.<br />

122 TED Talk. Clay Shirky. How cognitive surplus will change the world. June 2010.<br />

123 YouTube. TED. Erik Hersman: How texting helped Kenyans survive crisis. April<br />

22, 2009.<br />

124 http://www.ushahidi.com.<br />

125 http://www.ushahidi.com/about-us.<br />

126 TED Talk. Ory Okolloh. How I became an activist. June 2007.<br />

127 https://en.wikipedia.org/wiki/Short_code.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 67<br />

to take risks in the pursuit of changing the traditional way that information<br />

flows.” 128<br />

According to Patrick Meier, 129 a renowned crisis mapping expert (who<br />

formerly served as Director of Crisis Mapping at Ushahidi), Ushahidi is worth<br />

a shot because “the platform represents an important convergence of new<br />

technologies. SMS, Twitter, Facebook, YouTube, Flicker, smartphone apps,<br />

voicemail and email can all be combined with Ushahidi.” 130<br />

Since it was formed Ushahidi has gone through several upgrades that<br />

include: 131<br />

• Opening up the platform to third party developers for customization.<br />

• The creation of a smartphone app for Android and iPhones.<br />

• Easier mapping of multimedia that includes the integration of photos and<br />

videos. 132<br />

• In 2010, Ushahidi launched Crowdmap, which allows users to set up<br />

a Ushahidi map without having to install it on a separate server, hence<br />

making the process of setting up faster and simpler. 133 Crowdmap also<br />

allows users to login with their location and add relevant reports and<br />

information to a map.<br />

• SwiftRiver 134 is a platform that Ushahidi built that “enables the filtering<br />

and verification of real-time data from channels like Twitter, SMS, Email<br />

and RSS feeds.” It allows users to curate and analyze data in real time<br />

on specific topics.<br />

• Following the 2013 attack on the Westgate mall, Ushahidi’s team<br />

released Ping, a phone application that allows users to quickly notify<br />

family and friends that they are OK, by sending an SMS or email. Ping is<br />

open source, and has been improved since its first iteration to work on<br />

CRISIS MAPPING<br />

3<br />

128 http://www.ushahidi.com/about-us.<br />

129 http://irevolution.net.<br />

130 Patrick Meier. Ushahidi as a Liberation Technology. In Larry Diamond and Marc<br />

F. Plattner (eds.). “Liberation Technology: social media and the struggle for<br />

democracy”. University of Johns Hopkins Press. 2012. P. 96.<br />

131 http://www.open-steps.org/ushahidi-open-source-platform-for-collaborativedata-collection-nairobi-kenya.<br />

132 Patrick Meier. Ushahidi as a Liberation Technology. In Larry Diamond and Marc F.<br />

Plattner (eds.). “Liberation Technology: social media and the struggle for democracy”.<br />

University of Johns Hopkins Press. 2012. P. 97.<br />

133 http://ushahidi.com/products/crowdmap.<br />

134 http://ushahidi.com/products/swiftriver and http://www.ushahidi.com/2011/12/13/<br />

swiftriver-throws-a-lifeline-to-people-drowning-in-information.


68<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

• any kind of phone. 135 A public beta version of Ping is due for release in<br />

2016. 136<br />

• Recently Ushahidi launched BRCK, 137 which is a wireless battery and<br />

router that allows people to have internet access in the absence of<br />

electricity and/or a wireless internet connection. It is especially geared<br />

toward use in developing countries and remote locations.<br />

135 http://ushahidi.com/products/ping.<br />

136 http://pingapp.io.<br />

137 http://ushahidi.com/products/brck.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 69<br />

Other mapping platforms and what<br />

they offer<br />

Since Ushahidi was first set up in 2007, the sector of geomapping and<br />

crisis mapping has witnessed phenomenal expansion as well as the<br />

creation of new tools and platforms to make geomapping more accessible<br />

to communities and humanitarian volunteers globally. Below is a snapshot<br />

of some popular tools and what they offer.<br />

CRISIS MAPPING<br />

3<br />

OpenStreetMap<br />

OpenStreetMap 138 is a UK-based open source mapping platform that<br />

depends on a diverse community of enthusiastic mappers, GIS professionals<br />

and humanitarian workers mapping disaster-struck areas or even their<br />

own neighborhoods. It has over 1.5 million registered users and allows<br />

its members to access and edit raw data without restrictions or fees. 139<br />

OpenStreetMap emphasizes the importance of local knowledge in order to<br />

get the most accurate maps. It is an editable map. One of its best utilizations<br />

came right after the earthquake that struck Haiti in 2010, when in a matter<br />

of days hundreds of volunteers from around the world came together and<br />

crowdsourced the most detailed map ever produced of Haiti’s capital, Portau-Prince.<br />

Before that, Port-au-Prince was only partially mapped on Google<br />

Maps, and with very little detail. 140 A visualization of the evolution of the<br />

138 http://www.openstreetmap.org.<br />

139 http://osmstats.altogetherlost.com/index.php.<br />

140 National Geographic. Patrick Meier. How Crisis Mapping Saved Lives in Haiti.<br />

July 2, 2012.


70<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

OpenStreetMap during a period of 10 days in which more than a million<br />

edits were added to the map can be seen in this video. 141<br />

Geo Bucket and Easymappr<br />

Geo Bucket 142 and Easymappr 143 are easy to use mapping tools that can<br />

be used by volunteers and communities to gather data. They are geared<br />

toward users with very limited mapping skills and no map editing skills.<br />

They were both born in Uganda, under the patronage of the NGO Fruits<br />

of Thought. Both are applications that run on android smartphones (and<br />

can be downloaded from the Google Play Android store), but also support<br />

uploads of .GPX files. Both applications can also integrate maps seamlessly<br />

into OpenStreetMap.<br />

Geo Bucket is ideal for unmapped locations. It allows its users to map while<br />

they walk, by tracking the longitude and latitude of a phone and mapping<br />

roads accordingly as they move. This information is then uploaded to the<br />

Geo Bucket website where volunteers can use the information to map roads<br />

on the OpenStreetMap project.<br />

Easymappr puts data directly into OpenStreetMap by focusing on mapping<br />

specific categories of things, such as: drinking water/taps, markets,<br />

telecommunication towers, bookstores, recycling centers, and toilets.<br />

Mapbox<br />

Mapbox 144 is an open source cloud-based map hosting service and a tool to<br />

design maps that are visually appealing, can tell a story and are easily read<br />

by non-experts. 145 It is powered by OpenStreetMap and is collaborative and<br />

easy to update by anyone. Mapbox has been used by news agencies and<br />

non-profits to create customized, interactive maps with specific data sets<br />

(voting results during national elections, environmental issues, aggregation<br />

of a population by gender or age, etc.). On the downside, Mapbox does<br />

need some cartographic expertise and is hence not suited for direct use by<br />

communities with limited mapping skills.<br />

141 YouTube. Kanal von yobiSource. OpenStreetMap – Project Haiti. March 21,<br />

2011.<br />

142 www.geobucket.org.<br />

143 http://www.easymappr.com.<br />

144 https://www.mapbox.com.<br />

145 Digital Trends. Brandon Widder. Roll Your Own Maps: MapBox Wants to Become<br />

the Wikipedia of Digital Cartography. May 1, 2013.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 71<br />

Elva<br />

Elva 146 was founded in Georgia and has recently been converted from a<br />

project into an NGO. Elva, which means “lighting” or “express message” in<br />

the local language, is a mobile phone platform that allows easy feedback<br />

from local communities via SMS messages. At first glance it may sound like<br />

Ushahidi, but its founder says there are fundamental differences that include<br />

the following: 147<br />

• Elva does not focus on short-term crises, but rather tracks long-term<br />

issues such as community needs and the impact of policies on specific<br />

communities. Its founder, Dutch developer Jonne Catshoek, says that<br />

Elva is about, “governance and civil monitoring.” For example, the Elva<br />

platform permits its users to vote using SMS text messaging. The results<br />

are then reflected on a visual and interactive map. This has been used for<br />

taking national questionnaires on the developmental demands of citizens<br />

in Georgia. 148 It is also being used now in other conflict zones, such as<br />

Somalia. 149<br />

• Elva focuses on two-way communication with communities that<br />

have low internet penetration. Elva’s SMS format for surveys captures<br />

very detailed information from just one SMS. Elva’s utilization includes the<br />

recruitment of community volunteers who are trained to respond to SMS<br />

questionnaires periodically.<br />

• With Elva’s SMS function, an online questionnaire can be turned<br />

into a step-by-step SMS questionnaire. The team conducting the<br />

questionnaire can advertise a phone number or a short code provided<br />

by a local telecom company. Those interested in participating in the poll<br />

can then text the number and the system automatically begins a series<br />

of questions and responses over SMS, delivering each question in the<br />

poll as one SMS. 150<br />

CRISIS MAPPING<br />

3<br />

146 http://www.elva.org/about.<br />

147 Osservatorio Balcani e Caucaso. Onnik Krikorian. Elva, crowd-sourcing conflict<br />

in the South Caucasus. May 15, 2013.<br />

148 Voices from Eurasia (UNDP in Europe and Central Asia blog). Mark van Embden<br />

Andres. Elva Community Engagement helps map Georgia’s development<br />

priorities. October 11, 2013.<br />

149 Let Them Talk (blog). Helena P. Laurrauri. Re-thinking conflict early warning:<br />

Participatory polling in the Somali Region. February 22, 2014.<br />

150 Ibid.


72<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

• Elva has a security and conflict monitoring focus. It has been used<br />

to track incidents in conflict zones. It has also been used for conflict<br />

prevention by agencies like the United Nations and the European Union,<br />

and by non-profits. Data collected can be used to analyze trends for early<br />

warning systems and the software allows the use of regression analysis<br />

to forecast events.<br />

Google Crisis Map<br />

Google Crisis Map 151 is a program for the creation of geospatial maps aimed<br />

at making information more accessible during disasters; it is targeted at<br />

those responding to such emergencies as well as those impacted. It was<br />

developed by Google’s non-profit arm, Google Crisis Response team. 152<br />

Since 2008 Google has allowed local volunteers to contribute information<br />

during crises to enrich its maps. For example, Google Crisis Map was used<br />

extensively during the Pakistani floods of August 2010 and during Typhoon<br />

Yolanda in the Philippines in 2013. Since the Haitian earthquake (2010),<br />

Google’s Crisis Response team has responded to 25 disasters. 153 Google<br />

Crisis Map has the capacity to draw information scattered across the web<br />

in one place for easy access. They include the latest satellite images and<br />

information, such as flooded areas, shelters for victims, and neighborhoods<br />

impacted by power outages. The map is easy to view on mobile devices<br />

and easy to share on social media and to embed in any website. It also<br />

allows data to be imported into it in a number of web-friendly formats.<br />

151 https://support.google.com/crisismaps.<br />

152 http://www.google.org/crisisresponse/index.html.<br />

153 Al Jazeera America. Claire Gordon. How Google is transforming disaster relief.<br />

November 25, 2013.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 73<br />

Some videos to watch<br />

Crisis Maps from Google.org Crisis Response Team: this video explains<br />

what Google Crisis Map is and how it works. 154<br />

The Standby Task Force and the Libya Crisis Map: here Helena Puig<br />

Larrauri explains the work of the Standby Task Force (SBTF) after its<br />

first year of operation in Libya. 155<br />

Patrick Meier, Co-founder of Standby Task Force, talks about the<br />

SBTF. 156<br />

Patrick Meier’s TEDx talk on digital humanitarians. 157<br />

First Mile Geo: Inside Aleppo: A video that talks about the work of First<br />

Mile Geo in Aleppo, Syria. 158<br />

First Mile Geo<br />

First Mile Geo 159 is a relatively new online, cloud-based platform that<br />

generates printed map surveys and provides online tools to collect, analyze<br />

and visualize data from polls or surveys that are conducted on the ground<br />

with the help of local communities. That information is then geo mapped.<br />

So far First Mile Geo has been successfully used in conflict zones such as<br />

Syria and Somalia. What makes it particularly fitted for such environments<br />

is that it is optimized for low bandwidth environments and also allows<br />

paper surveys to be entered into the platform. It is therefore well adapted to<br />

situations of poor or unreliable internet connectivity.<br />

In Syria, for example, First Mile Geo was used to survey citizens in Aleppo<br />

on questions that covered: safety, population movement, crime, and basic<br />

service provision. Mapping this information helped assess humanitarian<br />

needs and also allowed the tracking of armed groups, which was important<br />

for humanitarian agencies who need to assess the security situation when<br />

making decisions. 160<br />

CRISIS MAPPING<br />

3<br />

154 YouTube. Google.org. Crisis Maps from Google.org Crisis Response Team.<br />

November 29, 2012.<br />

155 YouTube. CrisisMappersNet. ICCM 2011: The Standby Volunteer Task Force &<br />

Libya Crisis Map. February 2, 2012.<br />

156 YouTube. USAID Video. DevTalk: Patrick Meier. July 5, 2012.<br />

157 YouTube. TEDx Talks. Digital Humanitarians: Patrick Meier at TEDxTraverseCity.<br />

May 31, 2013.<br />

158 YouTube. First Mile Geo. First Mile Geo: Inside Aleppo. March 21, 2014.<br />

159 https://www.firstmilegeo.com.<br />

160 https://www.firstmilegeo.com/case_studies/aleppo.


74<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Top crisis mapping challenges and<br />

selected solutions<br />

To wrap up this chapter on crisis mapping (and before we dig into the<br />

interviews), we have selected the top five challenges that face crisis mappers<br />

globally and present some tried and tested solutions to those challenges.<br />

This, however, is not a comprehensive list of challenges that crisis mappers<br />

have encountered.<br />

1. The challenge of information overload and limited human<br />

resources was one of the major obstacles and a burden to mappers in<br />

the early years of crisis mapping. MicroMappers 161 was born out of this<br />

earlier experience of crisis mappers who realized that mapping requires a<br />

huge amount of human resources, because of the need to process the<br />

phenomenal amount of data generated by social media and survivors on the<br />

ground. 162 This usually meant that volunteers were quickly overwhelmed and<br />

that there was a huge backlog of unprocessed tweets and SMS messages<br />

– it was simply not sustainable during a huge crisis.<br />

The MicroMappers platform was hence set up to provide a community of<br />

volunteers who can be called upon, when needed, to gather, analyze and<br />

map social media data about a specific disaster area. It allows anyone in<br />

161 http://micromappers.com.<br />

162 National Geographic. Patrick Meier. How Crisis Mapping Saved Lives in Haiti.<br />

July 2, 2012.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 75<br />

the world with an internet connection to become a “digital humanitarian.” 163<br />

MicroMappers is made up of a number of applications called “Clickers”<br />

(some of which are still under development) that allow users to tag tweets<br />

and/or images (TweetClicker and ImageClicker).<br />

All one has to do is log into the MicroMappers website and start categorizing<br />

tweets and images that are geotagged. It takes three volunteers to decide if<br />

a tweet is relevant. Only then is that information moved to more experienced<br />

mappers, who build the map that will be used by humanitarian agencies, as<br />

well as survivors, to make important decisions.<br />

MicroMappers was first used, with great success, in south-west Pakistan<br />

in September 2013, when a 7.7 magnitude earthquake struck the region. 164<br />

The United Nations reached out to the founder of MicroMappers, Patrick<br />

Meier, asking for help. This presented an opportunity to test MicroMappers<br />

even before it was fully developed. Within the first few hours 35,000 tweets<br />

were collected and categorized by 100 volunteers. 14,000 tweets were<br />

deemed “relevant” and about 400 images were mapped. MicroMappers<br />

was also used in the Philippines during typhoon Haiyan.<br />

This was all made possible through the tireless efforts of the Standby Task<br />

Force (SBTF) 165 (working under the Digital Humanitarian Network 166 ), which<br />

is an online volunteer technical community of more than 800 mappers from<br />

over 70 countries, who are deployed on request by the United Nations and<br />

others to work on large-scale emergencies. This approach reduces the costs<br />

of coordination and pulls together a technical network of experts to respond<br />

faster and on a larger and more sustainable scale. In the next development<br />

phase of MicroMappers, SMS, video and translation applications are being<br />

developed to make the data available to mappers using the platform richer<br />

and more diverse.<br />

CRISIS MAPPING<br />

3<br />

2. Coordination of tasks and communication messages during a<br />

humanitarian crisis can be a major challenge. Many maps and SMS short<br />

codes can pop up, leading to the replication of work and data and to the<br />

confusion of communities receiving this information. For those affected by<br />

a crisis, access to information is a basic need. It can save many lives by<br />

raising the awareness of communities about their situation and getting their<br />

feedback on immediate needs, hence improving the prospect for service<br />

delivery. However, lack of coordination by those responding can mean that<br />

beneficiaries do not get the information that is most relevant to them.<br />

163 FastCompany. Ayana Byrd. Micromappers Lets Anyone Become a Digital<br />

Humanitarian. November 21, 2013.<br />

164 Wired.co.uk. Katie Collins. How AI, Twitter and digital volunteers are transforming<br />

humanitarian disaster response. September 30, 2013.<br />

165 http://blog.standbytaskforce.com.<br />

166 http://digitalhumanitarians.com.


76<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Some experts have advised that an “SMS code of conduct” be set up<br />

to streamline and centralize the flow of information and to make sure<br />

that information provided to communities is demand driven. Specific<br />

recommendations here include allowing recipients of SMS messages to<br />

request specific information depending on their location, and to unsubscribe.<br />

Other suggestions include setting up a “clearing house” that screens all<br />

outgoing SMSs, in addition to a complaints mechanism. 167<br />

One tool that can be used to streamline the division of labor amongst<br />

different actors responding to an emergency is Crisis Cleanup, 168 which<br />

is an open source US-based service that is built on Google App Engine<br />

and allows organizations to login and take ownership of tasks. Those tasks<br />

are then marked as “claimed” in a log that is transparent to all users of<br />

the platform. Tasks can be claimed remotely, hence reducing the need for<br />

coordination meetings. Locations in need of support can be identified and<br />

people who need help can also access the system to see if their area has<br />

been served. Crisis Cleanup can therefore allow for more transparency and<br />

accountability, and has so far been used in 4 countries in response to 12<br />

disasters. 169<br />

3. Using technologies closer to the local reality is key. It is vital that<br />

communities in need are reached through technologies that they can access<br />

locally, such as local media, community radio, and SMS or text messaging.<br />

Organizations like Internews 170 and First Response Radio 171 specialize in<br />

setting up public radio stations in local dialects during emergencies.<br />

167 iRevolutions. Patrick Meier. Towards an SMS Code of Conduct for Disaster<br />

Response. March 6, 2010.<br />

168 https://www.crisiscleanup.org/home.<br />

169 <strong>Social</strong> <strong>Media</strong> for <strong>Social</strong> Good. Timo Luege. Crisis Cleanup Helps Coordinate<br />

Disaster Responses. July 9, 2013.<br />

170 https://internews.org.<br />

171 http://firstresponseradio.org.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 77<br />

Additionally, the free and open source software FrontlineSMS can assist with<br />

sending large amounts of text messages, as well as receiving and managing<br />

SMSs. 172 While FrontlineSMS does not require an internet connection and<br />

the software can be downloaded for free, you will pay for each text message<br />

you send and might want to consider negotiating a rate with your local<br />

telecom provider.<br />

Video and additional material to read<br />

A video that explains the power of SMS and FrontlineSMS. 173<br />

Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for<br />

Emergency Coverage. 174<br />

4. Low or unstable internet connectivity is an expected challenge in<br />

many developing countries or after natural disasters. If this is the case,<br />

make sure to set up your system so data can be collected and saved offline<br />

and later synchronized when the internet is available, or use a platform like<br />

First Mile Geo, 175 which is adapted for low bandwidth.<br />

5. Verifying information. <strong>Use</strong>r-generated content in the aftermath of a<br />

disaster or emergency can be very high and can include a fair amount of<br />

rumor or inaccurate information. Nonetheless, user-generated content<br />

remains a valuable source of information for journalists and crisis mappers<br />

during a humanitarian crisis or political upheaval.<br />

Some would go as far as to say that social media have revolutionized<br />

journalism and allowed real-time coverage even in situations where journalists<br />

were not able to be on the ground. One such journalist is Andy Carvin, the<br />

senior social media strategist for National Public Radio (NPR), who shot<br />

to prominence for his live tweets about Tunisia, Egypt and Libya in 2011<br />

during the Arab Spring. 176 In his book, Distant Witness: <strong>Social</strong> <strong>Media</strong>, the<br />

Arab Spring and a Journalism Revolution, 177 he describes how he created<br />

a “Twitter newsroom” by gradually compiling a list of trusted sources, who<br />

were based in the region and had specialized knowledge and presence in<br />

CRISIS MAPPING<br />

3<br />

172 http://www.frontlinesms.com/technologies/frontlinesms-overview.<br />

173 YouTube. Tech <strong>Change</strong>. Laura Walker Hudson on the Power of SMS. December<br />

5, 2012.<br />

174 Craig Silverman. Verification Handbook: An Ultimate Guideline on Digital Age<br />

Sourcing for Emergency Coverage. 2014.<br />

175 https://www.firstmilegeo.com.<br />

176 NPR. ‘Distant Witness’: <strong>Social</strong> <strong>Media</strong>’s ‘Journalism Revolution’. January 31,<br />

2013.<br />

177 http://www.amazon.com/Distant-Witness-Andy-Carvin-ebook/dp/<br />

B00ARN9Q2S/ref=sr_1_1?s=books&ie=UTF8&qid=1399138922&sr=1-<br />

1&keywords=distant+witness.


78<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

specific locations, with whom he collaborated to verify information posted<br />

on Twitter. However, Carvin stresses that it is important to get acquainted<br />

with one’s sources outside social media and to know their affiliations,<br />

weaknesses, strengths and biases. 178 He noted that he would often press<br />

his sources for verification and would deeply question the context because<br />

a lot of context can be lost when people are posting updates in a state of<br />

shock or from a very specific context or location.<br />

Crisis mapper Patrick Meier points out that the future of verification in crisis<br />

mapping is moving toward the use of advanced computing options that<br />

include combining the use of machine computing and human computing<br />

(i.e., outsourcing tasks to a human crowd and then collecting and analyzing<br />

that information automatically). He notes that both fields are new but are<br />

developing quickly, and gives the example of the Verily platform, a human<br />

computing tool used to verify social media content, 179 “A parallel goal of the<br />

Verily project is to crowdsource critical thinking”, says Meier. 180 Verily is like<br />

a blackboard where information shared is discredited or verified by users of<br />

the platform. It will be especially useful for verifying conflicting information<br />

during disasters, such as images and/or videos. The platform has an<br />

incentives mechanism where people are given points to build their credibility<br />

and reputation for accuracy. <strong>Use</strong>rs of the platform can also post questions<br />

on Facebook or Twitter that need to be answered with a yes or no. Those<br />

with evidence can reply directly to Verily with text, pictures or video and are<br />

required to write a justification or explanation. Verily was launched in 2014.<br />

178 Craig Silverman. Verification Handbook: An Ultimate Guideline on Digital Age<br />

Sourcing for Emergency Coverage. 2014. PP. 71 and 75.<br />

179 http://veri.ly.<br />

180 Craig Silverman. Verification Handbook: An Ultimate Guideline on Digital Age<br />

Sourcing for Emergency Coverage. 2014. P. 80.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 79<br />

Interviews<br />

The uses and challenges of crisis mapping in<br />

Sudan and what we are learning<br />

Helena Puig Larrauri 181 is a peacebuilding practitioner who<br />

focuses on the intersection of technology, peacebuilding and conflict<br />

prevention. She is a freelance consultant, working with NGOs and<br />

the United Nations in conflict and post-conflict countries, including<br />

Sudan, Libya, Cyprus, Zimbabwe, Nepal, Kyrgyzstan and Iraq.<br />

Helena is also a co-founder of the Standby Task Force, an online<br />

volunteer technical community that is active in crisis mapping,<br />

comprised of more than 800 volunteers from around the globe.<br />

In this interview, Helena speaks about the lessons crisis mappers are<br />

learning in Sudan, the challenges they are facing and the technical<br />

skills and resources required to use the technology.<br />

CRISIS MAPPING<br />

3<br />

Q1. You have worked in Sudan for a few years and have<br />

seen the way crisis mapping has been adopted by Sudanese<br />

citizens from its very first uses during the national elections<br />

of early 2010 to subsequent uses during the January 30,<br />

2011 protests, during the protests of the summer of 2012<br />

(#SudanRevolts), and most recently during the humanitarian<br />

crisis following the floods of August 2013. Can you tell us what<br />

lessons we are learning in Sudan from these experiences?<br />

What mistakes do we keep doing that make it hard to benefit<br />

from fully utilizing the power of the data collected from crisis<br />

maps?<br />

The main lesson that people are learning, looking at the evolution<br />

from the Sudan Vote Monitor, during the 2010 elections to the<br />

crisis map set up for Nafeer during the floods of August 2013, is an<br />

increase in focus on what the data was being collected for and what<br />

it would be used for.<br />

With the elections, there was a lot of focus on collecting data and<br />

with voting and electoral fraud, but there wasn’t a clear action plan<br />

181 http://letthemtalk.org/bio.


80<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

as to what would happen with that data afterwards. I think with every<br />

iteration people are getting better at the things they really need to<br />

focus on and what happens with the data afterwards.<br />

In terms of mistakes that I’ve seen, I think there are a few smaller<br />

ones, but the main one is really a miscalculation on the resources<br />

that are needed to process data. There is a lot of focus on resources<br />

and on thinking and on time for collecting data, but I think that<br />

people using crisis maps in Sudan don’t fully budget for the amount<br />

of time and the amount of resources that are needed to verify data,<br />

to clean it and to then analyze it. That’s not something particular<br />

to Sudan, it’s something crisis mappers in other countries have a<br />

problem with as well.<br />

Q2. What are the main challenges for a country like Sudan<br />

when it comes to employing crisis mapping in these different<br />

events or scenarios (elections, protests and humanitarian<br />

crises)?<br />

There is one challenge that is common to all of these scenarios<br />

(elections, protests and humanitarian crises) and that challenge is<br />

the challenge of connectivity. As you know, internet connectivity in<br />

Sudan is not widespread across the country. It’s pretty concentrated<br />

in the capital. And mobile phone connectivity is pretty good, but it<br />

can be patchy. Certainly connectivity with data through a phone is<br />

very patchy.<br />

The main problem is that a crisis map is online, typically, and<br />

Sudanese crisis mappers need to find ways to get data from<br />

populations that don’t have access to the internet, whether it is<br />

through mobile phones or through the creative use of radio or word<br />

of mouth.<br />

These are very different events in terms of their political context.<br />

It is easier to have a crisis map for a humanitarian crisis because<br />

there is a common understanding that if you’re mapping needs, it’s<br />

something that everyone agrees on. There’s no doubt that people<br />

are in need. Even if certain political elements would prefer not to<br />

make that public, it’s an objective fact – people are in need.<br />

When it comes to elections it gets a little bit more difficult because,<br />

although there is a common understanding that election monitoring<br />

is a good idea ... perhaps not everyone would want the outcome of<br />

election monitoring to be quite so public.<br />

When it comes to protests it becomes even harder, because there<br />

are certainly a lot of elements in the Sudanese political scene that<br />

do not want the truth about what is happening in Sudan to be public<br />

and visible online.<br />

The challenge that is different with these three scenarios is the<br />

challenge of knowing whether a map will be blocked, or whether


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 81<br />

the means of communicating with a map will be blocked, or whether<br />

it will be hacked in some way. For protests, that is a very strong<br />

challenge. For humanitarian crises that is not really a challenge.<br />

Q3. In Sudan it seems that so far we have used crisis mapping<br />

generated by citizen efforts during an emergency of sorts.<br />

What would you say is a basic checklist for those launching<br />

such efforts under time restrictions and resource restrictions?<br />

There are three top things that people need to be thinking about in<br />

a crisis situation:<br />

●<br />

●<br />

●<br />

The first one is what will this data be used for? Who is your<br />

client? Who is your audience? And what are they going to do with<br />

this data? Are you trying to inform the media? Are you trying to help<br />

volunteers who are distributing things for basic needs? Are you trying<br />

to provide information to the National Electoral Commission? What’s<br />

the aim of the map? That has to be determined very quickly. It should<br />

be the focus of the map, because you are in a crisis situation and<br />

resources are limited, so that you really focus your efforts on getting<br />

the information that is needed for that audience.<br />

The second thing would be, that in a crisis situation there is a<br />

tendency to jump to the crisis mapping tool that most people<br />

know, which in Sudan is Ushahidi, which is an online mapping tool.<br />

And that might not be the best technical solution. So I would say,<br />

despite the time pressure, spend a moment thinking about what is<br />

the best technical solution for what you are trying to do.<br />

Thirdly in a crisis situation, in particular, there is a tendency to<br />

think very short-term. So lots of volunteers are willing to work on<br />

the crisis map at the very beginning. But maybe a week or a week<br />

and half down the road you’ve lost all the people who were working<br />

on the crisis map. If you’re being offered volunteers who want to<br />

work on the crisis map, try to stagger those resources. Don’t put<br />

them all at the beginning. Try to make sure that a week or a week<br />

and a half from now you will still have people to run the crisis map.<br />

There have been uses of crisis maps outside of emergency situations.<br />

There’s a project called Madrasatna, 182 which is a non-emergency<br />

crisis map that is mapping schools in Sudan.<br />

Q4. One thing you mentioned was that people tend to<br />

automatically think about Ushahidi, but it might not be the<br />

best option. Are you implying that there are now other options,<br />

similar to Ushahidi and probably easier to use?<br />

There are definitely other options. It’s not that they are easier to use<br />

in all circumstances, it’s that for certain types of jobs, they might<br />

CRISIS MAPPING<br />

3<br />

182 YouTube. Madrasatna. Madrasatna. (In Arabic.) April 29, 2014.


82<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

do the job better. And they are just as easy to use as Ushahidi. For<br />

example, Google’s Crisis Map is a free online resource. It’s more<br />

useful for certain kinds of information. People might want to look<br />

at the Elva platform and Caress Geo (which recently changed its<br />

name to First Mile Geo), which is another mapping tool. There are<br />

a number of other tools, but I would say these are your top three to<br />

check, as well as Ushahidi.<br />

Q5. What guidance can you give citizens and civil society<br />

groups who want to use crowd sourcing or crisis mapping<br />

for other purposes (such as tracking youth unemployment, or<br />

reporting water shortages in their neighborhoods, or sexual<br />

harassment of women)? What kinds of skills are required to<br />

use this technology?<br />

All of the tools that I’ve just mentioned can be used by someone who<br />

is comfortable on a computer, who is comfortable on the internet,<br />

but who is not a coder or programmer. You have to be computer<br />

literate and maybe know how to use an excel spreadsheet.<br />

However, if you want to use one of those tools and customize it to<br />

meet exactly what you want to do, so exactly the type of categories<br />

of data or something a little bit more advanced, then you need<br />

to have programming and coding skills. You can use a standard<br />

template of Ushahidi, without any technical skills. But if you want to<br />

customize it you’ll need some coding skills.<br />

Some of these tools require you to have server space and to be able<br />

to install a piece of free software on a server. So you have to get the<br />

server space and install the tool. If you are not able to do that, then<br />

you have to use something that is hosted on the cloud or hosted<br />

on the internet. For example, Ushahidi and some of the other tools I<br />

mentioned also offer that option for free.<br />

Q6. The real work behind crisis mapping is done on the<br />

ground with people and the relevant communities. Can you<br />

elaborate on that?<br />

Absolutely, the real work behind crisis mapping is identifying what<br />

the needs for data are and then finding that data, and collecting<br />

it in a way that is sensitive to the stories that communities want to<br />

tell. If you’re thinking about crisis mapping, 10 percent of your effort<br />

and your human resources should be devoted to the technology<br />

and to the data processing, and 90 percent of your effort should<br />

be devoted to community organizing and to talking to people about<br />

sharing their stories and understanding what they need to share.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 83<br />

Q7. In Sudan, has this been a challenge? Are we learning? Are<br />

we getting this?<br />

In Sudan, the groups that are doing crisis mapping initially were<br />

pretty focused on the technical stuff. There was a divide between<br />

the people who are really involved in organizing and the people who<br />

are really involved in the technical side. My sense is that groups like<br />

Madrasatna are bridging this divide – that they have both. I think that<br />

Sudanese crisis mappers are getting there.<br />

CRISIS MAPPING<br />

3


84<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

How HarassMap in Egypt is using crisis<br />

mapping to fight the sexual harassment<br />

of women<br />

HarassMap 183 is an online crowdmapping platform founded in<br />

2010 to address the chronic problem of the sexual harassment of<br />

women in Egypt. It collects information from witnesses and victims<br />

of sexual harassment, and uses a referral system to support victims.<br />

HarassMap also works with community networks on the ground to<br />

create “zero tolerance” sexual harassment zones. Since its founding,<br />

HarassMap has grown from a small number of volunteers to almost<br />

1,000. Its phenomenal success has led to its replication in eight<br />

countries in North Africa, the Middle East, and South Asia.<br />

Rebecca Chiao, one of the co-founders and the director of<br />

HarassMap in Egypt, spoke about her experience. 184<br />

183 http://harassmap.org/en.<br />

184 Human Rights First. HarassMap Founder Addresses Sexual Violence in Egypt.<br />

November 9, 2012.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 85<br />

Q1. What’s the story behind HarassMap? How and why was<br />

the idea of HarassMap born?<br />

The story of HarassMap is a bit of a personal story because me and<br />

my co-founders, who are Angie Khozlan, Amal Fahmy, and Sawsan<br />

Gaid, experienced this problem ourselves as women living in Egypt.<br />

We had all worked on this issue for several years before we launched<br />

HarassMap.<br />

The problem was that at the time we decided to start HarassMap,<br />

there was no project or activity going on in Egypt that was engaging<br />

the public or working with the public on a social level on this issue.<br />

There was some work being done by NGOs on advocacy for a new<br />

law. So we felt that in order to have the laws implemented or to have<br />

any impact on our daily lives, in our experiences as well as everyone<br />

else that we know, there needs to be a way to engage all of society<br />

in working together on this issue.<br />

To be honest we didn’t want to start this ourselves as an independent<br />

initiative. We wanted an NGO to take this on because they have<br />

resources, infrastructure, and experience. But none of them were<br />

interested so we started HarassMap as an independent group of<br />

volunteers. It was us four at the beginning and it grew from there.<br />

Q2. How does HarassMap technically work? What online<br />

platform does it use? How is data collected? What data does<br />

HarassMap crowdsource and what is done with that data?<br />

Our model is a little bit complicated because we have it integrated<br />

together with different activities. I’ll try to explain it from the first step.<br />

The very beginning is a Ushahidi-based reporting and mapping<br />

system. Victims and witnesses can send a report to us about what<br />

happened to them and where; what their experience was and any<br />

details they want to provide – and it’s anonymous. They can send it<br />

by SMS on their mobile phone, by a form on our website, by social<br />

media like Facebook and Twitter, or by email. They can send a report<br />

and get an auto-response from us about how to get services that<br />

are offered for free to victims already existing with [other] NGOs. We<br />

set up a referral network of organizations that provide support to<br />

victims. We use this mechanism to try and spread the word about<br />

this [problem].<br />

This is only a small part of what we do. We just started with it because<br />

it was an amazing opportunity to reach out and open a channel<br />

of communication to more people than have ever been reached in<br />

Egypt by an NGO project or a social project at this point.<br />

When we launched in 2010, 97 percent of Egyptians owned mobile<br />

phones. Now it is more than 100 percent, technically speaking,<br />

because many people have more than one. This was for us a very<br />

attractive way to reach more people geographically and socially than<br />

CRISIS MAPPING<br />

3


86<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

we ever would have been able to [reach] ourselves, with direct NGO<br />

work. But we didn’t want this to be just a website, or just a reporting<br />

system. We want to be able to give people an answer when they ask<br />

us, “What happens after I report? So what? What does a report do<br />

to change this problem?”<br />

Most important to us are these next steps.<br />

We take all of the reports and publish them on our website<br />

anonymously and map them on a map of Egypt. So it can be<br />

communicated that this isn’t a rural problem or an urban problem<br />

specifically – it crosses all social classes. It crosses all times of day,<br />

all types of women and how they’re dressed. Sometimes even<br />

men. So it breaks a lot of stereotypes, and we use this in public<br />

campaigns that try to change the attitude of society. We target<br />

mostly bystanders and we try to break the stereotypes that stop<br />

them from intervening when they see harassment happen.<br />

A lot of times this means stereotypes of what women are wearing,<br />

stereotypes about men and what drives them to harass or assault<br />

women. Our communications unit takes all of this data that we<br />

collect, and they craft messages that try to rebrand harassment from<br />

something that is considered cool or acceptable or masculine or fun<br />

(all of these are what we experience from people today), and we try<br />

to change that to a more positive role model, that the people who<br />

are standing up to harassment are cool and masculine and Egypt’s<br />

future, the people we should look up to.<br />

Q3. What work is done offline at the community level to<br />

complement the crowdsourcing of information online?<br />

We also use this information in our community outreach unit, which<br />

is the main part of what we do. We have hundreds of volunteers all<br />

over Egypt, and we train them to organize their own communities<br />

in ways that engage people to change their behavior from one<br />

that ignores harassment or accepts it or tolerates it or stays silent<br />

about it, to one that stands up to it. And we created these zerotolerance<br />

areas where harassers feel that they’re not welcome or<br />

that there will be some consequences. This will make them think<br />

twice about harassing or assaulting someone and hopefully deter<br />

them in the future. In this way little by little hopefully we will change<br />

what’s happening on the ground in reality, as well as going beyond<br />

awareness, going beyond attitude change and making behavioral<br />

change in the streets.<br />

This is something we’re also trying to expand into a workplace antiharassment<br />

campaign, and we’re also starting work in schools and<br />

universities.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 87<br />

Q4. What were the main challenges with using the crisis map<br />

(associated with anonymous crowdsourcing of reports of<br />

sexual harassment) when you first launched it? And how did<br />

you work around these challenges?<br />

We had many challenges. When we started we were completely<br />

volunteers and we had full-time jobs and no money – we paid for<br />

everything ourselves. We were really limited in terms of capacity and<br />

for us this was the biggest challenge. From the first day we launched<br />

we had too many volunteers for us to handle. They were more than<br />

100, I think. It was difficult to do the plans that we wanted to do<br />

while not having enough people to keep track of everything, and to<br />

organize it and carry it out.<br />

Just after we launched (in December of 2010), the first demonstrations<br />

in Egypt’s revolutions started in January 2011. Since then we’ve had<br />

several governmental changes, so we’ve had lots of instability. This<br />

is also very difficult; it makes planning our community work really<br />

hard. There is always something going on, so we always have to<br />

change our plans, and this takes a bigger capacity than what we<br />

usually have.<br />

In terms of the data and the technological challenges, the first<br />

challenge was that we had to adapt the technology to what was<br />

available in Egypt. Because here in Egypt we couldn’t find the mobile<br />

phone that uses FrontlineSMS, as directed by the instructions on the<br />

[Ushahidi] website, we had to find a way around that.<br />

We don’t have regular internet. We also have a problem with locations<br />

here. Ushahidi is set up to be a bit automated, so in some countries<br />

you can just give an address in the phone, or GPS coordinates, and<br />

it automatically maps the location of the report that you are sending.<br />

In Egypt we don’t really use street addresses very much, we usually<br />

describe things like, “In this neighborhood, next to the McDonald’s,<br />

down the street from the school.” And of course Ushahidi is not able<br />

to handle this kind of description.<br />

We also have a language challenge in that reports come in Arabic,<br />

they come in English, they come in Arabic written in English letters,<br />

so it’s pretty haphazard. These are challenges that we had to figure<br />

out. Thankfully we are doing ok with that.<br />

The verification was a challenge we thought we would have before<br />

we launched. But as soon as we launched we realized that it didn’t<br />

turn out to be a problem. Fake reports are really easy to identify, and<br />

real reports are really clear that they’re real. We look at each report<br />

personally, and we read it and we make sure that it’s believable and<br />

it’s mapped accurately and has all the important information in it. But<br />

we don’t go out and physically verify that people are telling the truth<br />

because, just like any other data collection, there is going to be the<br />

possibility that someone exaggerates or someone misremembers<br />

something. There is always a margin of error because people are<br />

CRISIS MAPPING<br />

3


88<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

fallible – and this isn’t the most important thing. The most important<br />

thing to us is that we learn important information about what’s going<br />

on in the streets, so we could address it in an effective way and we<br />

could share this information with other people addressing it, so that<br />

they can be effective as well. And that victims and witnesses can<br />

have a voice – a way to talk about this – and to talk freely and safely<br />

where they don’t have to fear being punished or being attacked, or<br />

any of these other consequences that we sometimes hear about.<br />

Last year there was a terrible incident in Asyut, where a girl who was<br />

harassed by a man on a motorcycle spoke back to him and spat at<br />

him. He beat her and then shot her, and she died. So sometimes<br />

speaking back is not always a safe option. This is important to us as<br />

well, and to be able to connect people with help. Even though we<br />

can’t provide professional counseling or legal service ourselves as<br />

HarassMap, we have partners that do this for free. So at least we’re<br />

able to put people in touch with them.<br />

Q5. How were you able to advertise for HarassMap to get 100<br />

volunteers from the first day?<br />

It might not be 100. Our numbers during that time when we were<br />

first volunteers are very inaccurate. I was just making a guess. But<br />

it was a lot, it was more than we could handle. We didn’t have the<br />

capacity to advertise. We decided to test our online platform before<br />

we launched. It was in mid-October when we decided to test this<br />

out with our friends on Facebook and Twitter just to see if it was<br />

going to have any technical problems or if it works. Angie and I were<br />

sitting at my house having lunch together and we just decided to<br />

do it spontaneously, and within 24 hours the website crashed. We<br />

don’t know how people heard about this. We thought we were just<br />

telling our friends. Then we got a lot of volunteers and a lot of media<br />

coverage; it must’ve been through social media.<br />

Q6. How has HarassMap evolved from the time it was<br />

launched in terms of its overall objectives, scope and reach –<br />

both online and offline?<br />

We have gotten amazingly better at what we do. When we first<br />

launched we had a model, a plan. We were able to implement it<br />

on a small scale, and we got good feedback about it. So [we] kept<br />

trying to improve how we are doing it, improve our ability to do it and<br />

continually take feedback and try to implement it.<br />

We all had full-time jobs, and it was really hard to do this on evenings<br />

and weekends, especially when the commute in Cairo to and from<br />

work is sometimes two hours long. It was tough. The real turning<br />

point was in June 2012 when we got a grant from IDRC for a<br />

research project. This gave us a little bit of money to hire some core<br />

staff. When we hired the staff they were incredible. They were much<br />

more skilled than me and Angie, or any of us. They had the ability to


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 89<br />

improve on the work that we are doing, and the plan that we had, to<br />

incorporate the feedback and make things strong and do a thorough<br />

job with what the original model was. But then also to expand and<br />

come up with new ideas that we have never thought of before.<br />

Starting with the middle of 2012 it was a whole new story for us, and<br />

we were able to expand the number of places that we are in, but<br />

also deepen our work and do it in a much better way. Now, instead<br />

of having a couple of hundred volunteers that were enthusiastic but<br />

badly trained, we have a couple hundred very well trained volunteers,<br />

and they have their own teams in their local communities as well,<br />

and it’s much stronger and much more consistent.<br />

They are doing much more work on the ground and we are integrating<br />

creative ideas, like cooperating with a project that does open-mic<br />

events where people have five minutes to talk about this issue and<br />

just say what’s in their hearts or what happened to them, no matter<br />

what they think, whether they agree with us or not. This has opened<br />

up an important dialogue in communities.<br />

We are starting a partnership as well with another initiative that works<br />

directly with harassers, which is something we don’t do ourselves.<br />

I think this is starting to strengthen the work a lot, and making it<br />

possible for these local teams in different communities around<br />

Egypt to have a good, effective and dynamic approach, which is<br />

appropriate for their communities and led by them and not by us<br />

sitting in Cairo. So this has been the real change for us.<br />

Q7. What impact has access to reliable visual, quantitative<br />

and qualitative data on sexual harassment against women in<br />

the streets of Cairo had in terms of pressuring the authorities,<br />

persuading/helping civil society actors and making sure that<br />

women impacted by sexual harassment get the support they<br />

need.<br />

This is something that we’re very slow on setting up. We just found<br />

a Monitoring and Evaluation (M&E) consultant to come and help<br />

us design a formal M&E system. So soon hopefully we will be able<br />

to have measurements of results. Before this we didn’t have the<br />

capacity to do it in an accurate, measurable, scientific way – we just<br />

did it the best we can.<br />

We have a lot of anecdotal information, and we take feedback after<br />

every event, after every volunteer-organized community event. We<br />

take a lot of feedback and we discuss it, analyze it, and we try to<br />

adjust our program based on that feedback.<br />

We have some measurements of things like when we make social<br />

media campaigns, we can estimate the spread, but we can only<br />

estimate the first layer. If you share something on Facebook you can<br />

CRISIS MAPPING<br />

3


90<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

see how many people shared directly from you, but you can’t tell<br />

how many have shared from the people who shared. 185<br />

For example, in our public campaign that we did, countering the<br />

myths about sexual harassment (this was based on the data that we<br />

got and the feedback from the field), a lot of people say harassment<br />

is because of the way people are dressed, or harassment is because<br />

people are not educated. We noticed that this isn’t held up by the<br />

data, so we made a campaign that said, “If harassment is because<br />

of how women dress, then why are veiled women and women who<br />

wear niqab harassed?” “If harassment is because people are not<br />

educated, then why are university professors harassing?” We’ve had<br />

several messages and they went completely viral.<br />

Even though we can’t measure the exact amount of people who<br />

saw this because of the way Facebook works, we do have some<br />

idea on the direct shares. But also anecdotal things like the Muslim<br />

Brotherhood took our campaign, took our logo off and put their logo<br />

on, and started sharing with their network, which is amazing for us.<br />

We love it.<br />

The idea that this campaign resonated and spread way beyond<br />

our own networks is a real success for us. So we are weak on the<br />

numbers, but we have a lot of qualitative or anecdotal feedback from<br />

people.<br />

Q8. It’s obvious that HarassMap is very inspirational; it’s going<br />

global. Can you tell us a little bit about how it’s going global,<br />

how that interest started and what support do you give for<br />

countries or communities outside Egypt that are thinking of<br />

replicating HarassMap?<br />

We got our first request early on; it came a few months after we<br />

launched in early 2011. We realized very early on that a program like<br />

this has to be crafted by people locally. It can’t be something that<br />

was designed for Egypt and then applied in Canada without any<br />

changes or adaptation.<br />

We rely on people taking control over their own replication. So there<br />

is support that we give them, but it is really limited to coaching. There<br />

have been 25 other countries that have contacted us so far. Usually<br />

it starts with sharing our information or anything we have written.<br />

Then setting up time for a Skype coaching session, and I do that. I<br />

answer any of their questions, I tell them about the challenges that<br />

we had, the things that we do differently, what harassment is like<br />

here.<br />

185 Facebook has introduced a feature that allows one to see the number of times<br />

an item or article was shared by others as long as the “shared” button was used.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 91<br />

And how we planned our program, how it’s very important to have<br />

the online component, but also a strong offline component, and what<br />

needs to be done in order to prepare for that. What needs to be done<br />

to answer people’s questions about what happens after they send<br />

a report, or why they should send a report. To think through all of<br />

these issues and to brainstorm about planning their local program,<br />

because harassment and assault look different in different countries.<br />

Then I put them in touch with anyone who can help them. Ushahidi<br />

has been a wonderful support. They coach people as well on setting<br />

up the tech platform. FrontlineSMS can also help people. And<br />

also create a community so they can talk to each other and share<br />

experiences. I stay in touch with them in case they decide to give<br />

me questions later on. We would like to develop this better in the<br />

future, so we would be able to share best practices or brainstorm<br />

together and share experiences in a more systematized way. But this<br />

is something that we haven’t had the time to develop because we<br />

focus mostly on Egypt.<br />

CRISIS MAPPING<br />

3


92<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Fareed Zain: Sudan Vote Monitor<br />

The very first time the Sudanese civil society attempted to use crisis<br />

mapping was during the April 2010 elections and for purposes of<br />

observing and monitoring the elections. Through what was then<br />

called the Sudan Vote Monitor, a Ushahidi-based platform was set<br />

up to receive information via SMS text, email and an online form. It’s<br />

noteworthy to mention that this was the first time Sudan was having<br />

national elections in 24 years and hence, Sudanese citizens, not only<br />

inside Sudan, but also in the diaspora were anxious to lend a hand.<br />

We spoke to Fareed Zain, an IT professional and the mind behind<br />

the Sudan Vote Monitor, who at the time was living in the US and still<br />

resides there. He acted as the technical architect for the project. 186<br />

Q1. Can you tell us about your technical/professional<br />

background and why you thought this Ushahidi-based<br />

platform or the Sudan Vote Monitor was a relevant solution<br />

at the time?<br />

I am an IT professional, that’s what I do for a living, and that is what<br />

I came to America to do. I work as an IT manager for a major oil<br />

and gas company. I was basically looking for ways to help the first<br />

election in Sudan to go well and have chances of success. And I was<br />

looking for technologies because that is the area that I know best<br />

and where I can use my own skills to lend a hand.<br />

Through my research about crisis mapping and using SMS<br />

technology to help civil society organizations, my objective was how<br />

to help civil society organizations from far away, since I live in the US.<br />

186 www.sudaninstitute.org.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 93<br />

When I learned about the Ushahidi platform I did some research, and<br />

I was convinced that this is the right tool that we needed so we could<br />

help the civil society do what they do best [during the elections].<br />

Q2. Since the experts I have talked to so far tell me that a small<br />

part of the work of crisis mappers is about the technology<br />

and a much bigger part is about the outreach on the ground<br />

and verifying the credibility of the information you receive,<br />

can you tell us about the partnerships with the Sudanese civil<br />

society in Sudan and what role they played?<br />

Our role was to support the civil society, so we were not the ones<br />

doing the heavy lifting; that was done by the people on the ground.<br />

Our role was to use technology as an enabler in order to improve<br />

their chances of success and that is what Ushahidi gave us. It is a<br />

technology that is familiar and that people can adopt quickly. SMS is<br />

obviously [a technology] around the world that has been successfully<br />

used for many applications.<br />

So what we did is, we tried to help civil society, both in Sudan<br />

and South Sudan. In the North the civil society organization that<br />

we partnered with is called Asmaa Society for Women, and in<br />

South Sudan it was the Community Empowerment for Progress<br />

Organization (CEPO).<br />

They were already certified election monitors, so they had people on<br />

the ground and they were doing election monitoring and reporting<br />

using paper forms. We came in and took the paper forms that they<br />

had and then developed the online reporting system, and gave them<br />

the SMS codes that they can use to send us messages. Then we<br />

developed the website and the whole reporting mechanism. We<br />

acted as an enabler, but all the work was done on the ground by the<br />

civil society. We trained them on how to use the technology, how to<br />

report, and how to send us reports.<br />

CRISIS MAPPING<br />

3<br />

Q3. What were the biggest challenges both from the technical<br />

side and from the aspects linked to the environment in Sudan,<br />

be it social, political or cultural?<br />

From the technology side there were huge challenges and because<br />

this is the first time this was done in Sudan we ran into issues that<br />

people haven’t experienced before. One of the biggest challenges<br />

we ran into was getting the SMS short codes. In SMS there is a<br />

technology called short codes which is a 5- or 8-digit code that you<br />

give to whomever wants to send you these coded messages. That<br />

code has to be gotten from the telecom operators, so we had to go<br />

and find the telecom operators. We ended up doing that through<br />

Zain and securing the access to the short codes, then paying for it.<br />

Getting the infrastructure set up was a big challenge because they<br />

were never asked to do something like this before. We worked with


94<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

a company in South Africa, which develops software that takes the<br />

short codes from the telecom operators and aggregates it into the<br />

back end, so that we can take it from there and report it on our<br />

website. We had to find another aggregator, where they sell these<br />

short codes, because in the case of Sudan they were not already<br />

there; we had to bring them in and introduce them to Zain and<br />

facilitate that process.<br />

That was on the technical side. On the ground the big challenge<br />

was introducing the concept, as well as mobilizing enough people<br />

to the remote sites. Sudan is very remote and spread out, so getting<br />

people mobile phones so they can report from wherever they have<br />

to be was a logistical challenge.<br />

We also had a special challenge with security because, in the 2010<br />

elections, [monitoring] was not something that was welcomed by the<br />

government. In fact on the second day of monitoring our website<br />

was shut down, and we had to go through all kinds of technical back<br />

doors to get it back online again.<br />

Q4. What would you do differently if you were to repeat this<br />

experience, say for the next elections in 2015?<br />

We would mobilize early and we would secure the short codes early,<br />

so we could give the [election] monitors the resources they need. We<br />

would need to provide them with enough mobile phones so they can<br />

report from where they are. We would train them. We would also use<br />

some sort of technology to mask out their numbers, so they’re not<br />

easily detected or risk disclosing their identity. We would mobilize the<br />

largest number of monitors that we can and train them early.<br />

Overall we proved that the technology works and that the civil society<br />

can adopt it quickly as well as the public. Once we publicized, at<br />

short notice people were able to pick it up. From my perspective it<br />

was a very successful undertaking.<br />

Q5. From what you’re saying, if people are interested to<br />

use crisis mapping for the next elections, starting early and<br />

planning early is key to its success?<br />

Absolutely. That is the key, as well as partnering with a large number<br />

of civil society [organizations], because civil society is where the<br />

rubber meets the road, as they say. They are already on the ground,<br />

so partnering with a representative number of civil society [groups]<br />

and giving them the resources they need to deploy their monitors is<br />

vital. That all takes planning and starting early, which is key.


CHAPTER 4<br />

Crowdfunding<br />

CROWDFUNDING<br />

4


96<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CHAPTER 4<br />

Crowdfunding<br />

This chapter takes a look at crowdfunding, and<br />

gives examples of the wide array of crowdfunding<br />

platforms that have emerged since the tremendous<br />

success of Indiegogo and Kickstarter that were<br />

launched in 2008 and 2009 respectively.<br />

The advantages of crowdfunding over targeting a few individual donors are<br />

discussed; and the concept of “civic crowdfunding” is introduced, along with<br />

a discussion on emerging trends in crowdfunding. The challenges related<br />

to crowdfunding faced by countries under US comprehensive sanctions are<br />

also presented and solutions are proposed.<br />

The chapter focuses on the two largest crowdfunding platforms, Kickstarter<br />

and Indiegogo, providing a detailed comparison to help users make a sound<br />

decision on which platform to use. A case study of Nafeer, the youth-based<br />

humanitarian initiative that was established to respond to the floods that hit<br />

Sudan in August 2013, is presented to showcase how crowdsourcing (in<br />

the form of both crisis mapping and crowdfunding) was used during that<br />

national emergency.<br />

We move on by giving tips and essential steps on how to run a successful<br />

crowdfunding campaign. The chapter wraps up with an interview with one<br />

of the team members who executed the OUR SUDAN short film project,<br />

which used Kickstarter to fundraise. Their experience and the challenges<br />

they faced are shared.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 97<br />

A basic introduction to<br />

crowdfunding<br />

The decentralized nature of the internet and the rise of social media have<br />

revolutionized and democratized the way citizens around the world are<br />

fundraising. These online fundraising efforts are often happening outside the<br />

constraints and rigid hierarchy of institutions and traditional donors by using<br />

the power of local and global networks to get financial support for projects<br />

and ideas.<br />

Crowdfunding, 187 defined as the collection of small and individual donations<br />

from the “crowd” via online platforms, is historically an old practice, rooted in<br />

collective action. Hence, crowdfunding exists as a traditional offline practice<br />

in many cultures from Africa to Latin America. 188 However, it is only since<br />

2008/2009 that it has become a global phenomenon and an industry that<br />

was worth USD 5 billion in 2013 (according to the Crowdfunding Industry<br />

Report 189 ). This is thanks to the unparalleled popularity of companies like<br />

Kickstarter, 190 an online crowdfunding platform that specifically caters to<br />

crowdfunding for creative projects and whose three founders all came from<br />

creative arts backgrounds.<br />

In the case of non-profit organizations and non-institutional civic initiatives,<br />

utilizing online crowdfunding platforms has several advantages. It:<br />

1. Allows a diversification of the donor pool.<br />

2. Permits fundraising based on locally identified needs that is not led<br />

by donor agendas or priorities.<br />

3. Reduces administrative paperwork linked to reporting back to donors,<br />

which often drains the energy of small local civic organizations.<br />

4. Increases the potential of engaging diaspora communities from the<br />

global south in participating in civic or citizen-led initiatives in their countries<br />

of origin, initiatives that they would not easily have known about otherwise.<br />

(See the case study on page 109 from Sudan on the Nafeer campaign.)<br />

5. Increases the agency of citizens organizing collectively at a community<br />

or grassroots level and outside the boundaries of institutions, by giving<br />

citizens access to funds while retaining ownership over their projects.<br />

CROWDFUNDING<br />

4<br />

187 http://en.wikipedia.org/wiki/Crowd_funding.<br />

188 Rodrigo Davies. The Digital Pollada, or What I learned About Crowdfunding from<br />

Peruvian Chicken. April 28, 2014.<br />

189 http://www.crowdsourcing.org/editorial/2014cf-the-crowdfunding-industryreport/25107.<br />

190 https://www.kickstarter.com.


98<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

6. Institutionalizes the fundraising process by providing a platform<br />

that is centralized and transparent, permitting multiple actors such as<br />

businesses, government agencies, non-profits, citizens and donors/<br />

supporters to participate simultaneously.<br />

Since it was founded, Kickstarter has raised more than USD 1.7 billion and<br />

successfully funded over 85,000 projects globally. 191 This included more<br />

than USD 200 million raised for film and video projects alone. 192 Some of<br />

those films went on to win awards and Oscar nominations, such as the<br />

short documentary Inocente.<br />

Kickstarter statistics 193<br />

2012<br />

YEAR<br />

2013<br />

YEAR<br />

$319,000,000<br />

pledged<br />

2,200,000<br />

backers<br />

KICK<br />

$480,000,000<br />

pledged<br />

3,000,000<br />

backers<br />

18,109<br />

Projects<br />

STARTER<br />

19,911<br />

Projects<br />

177<br />

Countries<br />

$606.76<br />

Pledges per minute<br />

214<br />

Countries<br />

$915<br />

Pledges per minute<br />

source: https://www.kickstarter.com/year/2012<br />

source: https://www.kickstarter.com/year/2013<br />

There is also the all-encompassing, very popular and international<br />

crowdfunding platform, Indiegogo, 194 which caters to anything from<br />

creative and artistic projects to technological innovations and humanitarian<br />

causes. It offers more flexible fundraising requirements than Kickstarter (see<br />

comparison on pages 106 and 107).<br />

Indiegogo and Kickstarter have similar funding models, which involve<br />

charging project creators a 4 to 5 percent platform fee, and an additional<br />

2 to 3 percent for electronic payment processing. This funding model is<br />

common to many crowdfunding platforms around the world.<br />

191 https://www.kickstarter.com/help/stats?ref=footer.<br />

192 Kickstarter Blog. Michael McGregor. A big day for film. March 14, 2014.<br />

193 https://www.kickstarter.com/year/2012 and https://www.kickstarter.com/year/2013.<br />

194 https://www.indiegogo.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 99<br />

After Indiegogo and Kickstarter were founded, many crowdfunding<br />

platforms have come into existence, catering to a plethora of interests and<br />

needs. 195 Some are very specific and geographically localized, such as<br />

DonorsChoose, 196 an online platform where ordinary citizens can directly<br />

choose to fund school projects (in the United States) initiated by public<br />

school teachers. It has included crowdfunding for field trips, books, and<br />

school supplies, amongst other things. DonorsChoose was founded by a<br />

school teacher in 2000, and is considered one of the earliest examples of<br />

online crowdfunding.<br />

For projects that are unable to find a suitable home on existing platforms,<br />

it is possible to host an online crowd fundraiser on a personalized platform<br />

such as the open source crowdfunding platform Selfstarter. 197 However,<br />

to use this you will need to have web design and programming skills, as<br />

well as an existing support network. Such support networks, which provide<br />

automatic marketing and a donor base, are an advantage for small to<br />

medium-sized projects, and are readily found in the more accomplished<br />

crowdfunding platforms that have communities of followers and a high<br />

level of trust attached to them. Some of the advantages that go with a<br />

customized crowdfunding platform or website include:<br />

1. No fees linked to using the platform.<br />

2. The focus is on your project and not the platform that you are using.<br />

3. You get to control the user experience by controlling the design and<br />

layout of your website.<br />

4. You can get access to a larger array of metrics or analytical data<br />

linked to your fundraising campaign than traditional crowdfunding platforms<br />

would provide. 198<br />

CROWDFUNDING<br />

4<br />

195 TriplePundit. Crowdfunding Platforms: What You Should Know. June 25, 2013.<br />

196 http://www.donorschoose.org.<br />

197 http://selfstarter.us.<br />

198 TechCrunch. Vikas Gupta. A Look At Play-i’s Successful Crowdfunding Campaign.<br />

April 26, 2014.


100<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Trends in crowdfunding and the<br />

rise of civic crowdfunding<br />

The increased specialization of crowdfunding platforms is one obvious trend<br />

that has emerged in recent years. For example, some platforms, such as<br />

Causes, 199 Razoo 200 and CrowdRise 201 are dedicated to supporting the<br />

causes of non-profit organizations and/or charities. Others cater to personal<br />

and group projects, such as tuition, medical expenses or even planning<br />

parties. Examples include Tilt, 202 GoFundMe, 203 Zokos, 204 and YouCaring. 205<br />

It gets even more specific with platforms such as Experiment, 206 which<br />

supports crowdfunding for scientific research and innovations.<br />

Crowdfunding platforms are also becoming localized and are starting to<br />

slowly appear outside the United States and Europe in the global south.<br />

This is mainly because local contexts matter and challenges such as<br />

language and currencies can be addressed by locally-based platforms. It<br />

is also because research has shown that the location of communities is<br />

closely linked to who actually uses online crowdfunding platforms; and that<br />

those who use crowdfunding platforms the most tend to live in the cities<br />

where those platforms are headquartered. 207<br />

Examples of crowdfunding platforms from the Middle East 208 region include<br />

Yomken. 209 Founded in 2013 and headquartered in Egypt, it supports small<br />

industrial workshop owners (glassblowers, mechanics, etc.), by linking them<br />

with problem solvers and innovators, as well as investors. There is also<br />

Aflamnah 210 (founded in June 2012) which is based out of Dubai in the UAE<br />

and caters to filmmakers from the Middle East region. Also based out of<br />

the UAE and founded in mid-2013 is Eureeca, 211 which is a crowdinvesting<br />

platform that links small- and medium-sized entrepreneurs to investors and<br />

retailers who want to support new business ideas.<br />

199 https://www.causes.com.<br />

200 http://www.razoo.com.<br />

201 http://www.crowdrise.com.<br />

202 https://www.tilt.com.<br />

203 http://www.gofundme.com.<br />

204 http://www.zokos.com.<br />

205 http://www.youcaring.com.<br />

206 https://experiment.com.<br />

207 Rodrigo Davies. The Digital Pollada, or What I learned About Crowdfunding from<br />

Peruvian Chicken. April 28, 2014.<br />

208 The National. Neil Palmer. Crowdfunding in Mena region finally starts to take off.<br />

May 5, 2014.<br />

209 http://yomken.com/?lang=en.<br />

210 http://www.aflamnah.com.<br />

211 http://eureeca.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 101<br />

In Latin America, popular crowdfunding platforms include the Brazilian site<br />

Catarse 212 that supports creative projects. It was the first crowdfunding<br />

platform to make its platform’s code open source and therefore available for<br />

others to copy or build upon. To date, at least 10 crowdfunding platforms<br />

have been built using Catarse’s code.<br />

Crowdfunding that specializes in creating a shared public good or a service<br />

to a community is sometimes referred to as civic crowdfunding. 213 Examples<br />

include creating green spaces or parks, renovating playgrounds, building<br />

community centers, or organizing cultural festivals. Some experts argue<br />

that crowdfunding generally, and civic crowdfunding specifically, is a form<br />

of self-management that citizens are moving toward, and that it is replacing<br />

the work of governments and shifting the responsibility and risks of State<br />

institutions to individuals, especially at times of economic strain. Civic<br />

crowdfunding also allows individuals to have ownership over their projects,<br />

and lets them take more responsibility and risk that in the past used to be<br />

concentrated in the hands of institutions.<br />

Rodrigo Davies, who is an expert in civic crowdfunding, argues that civic<br />

crowdfunding is also institutionalizing the process of crowdfunding by<br />

creating centralized and transparent mechanisms that permit the creation<br />

of diverse partnerships, such as the intersection of crowdfunders with the<br />

private sector, public sector and civic communities. He says:<br />

Therefore we might say that the optimal form of civic crowdfunding<br />

occurs at the intersection of all four interests, with each<br />

contributing to the outcome. That is to say, the ‘perfect crowd’<br />

for a civic project involves all actors, since public projects in the<br />

built environment that serve civic goals will impact or intersect with<br />

the interests of government, for-profit and nonprofit organizations,<br />

and the crowd. 214<br />

Spacehive, 215 the first online crowdfunding platform that caters to civic<br />

projects (launched in 2012), does exactly that by bringing together people<br />

from local communities who have ideas for civic projects with businesses,<br />

government bodies and even design professionals who want to invest in<br />

these projects. Spacehive also works with grant-making organizations to<br />

help them set up matching-funding schemes 216 for projects they want to<br />

support. The platform is London-based, and supports only communities<br />

in the United Kingdom, but its model has inspired the spreading of the<br />

CROWDFUNDING<br />

4<br />

212 https://www.catarse.me.<br />

213 Rodrigo Davis. Is Crowdfunding Participatory Citizenship or a Sign of Institutions<br />

in Decline? March 23, 2014.<br />

214 Rodrigo Davis. What’s civic about civic crowdfunding? December 3, 2013.<br />

215 http://spacehive.com.<br />

216 https://spacehive.zendesk.com/hc/en-us/articles/201812067-I-want-tomatch-fund-projects.


102<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

idea of online civic crowdfunding to the United States. Examples include<br />

Citizinvestor 217 and Neighbor.ly. 218<br />

Both Citizinvestor and Neighbor.ly approve project ideas from citizens only<br />

if they have been backed by their local municipality or city hall. 219 However,<br />

both platforms do permit citizens to propose projects. In the case of<br />

Citizinvestor the focus is on small-sized projects (USD 10,000- 20,000). 220<br />

Once a citizen’s petition reaches its funding goal, Citizinvestor goes the<br />

extra mile by introducing citizens who initiated the petition to the appropriate<br />

people in their city municipality. This model of online civic crowdfunding<br />

platforms clearly demands a more hands-on approach by the platform<br />

owners who are required to vet projects and build relationships with local<br />

governments and businesses.<br />

217 http://www.citizinvestor.com.<br />

218 https://neighbor.ly.<br />

219 TechPresident. Miranda Neubauer. Three Kickstarter-Inspired, Civically Minded<br />

Crowdfunding Sites. July 31, 2012.<br />

220 Mashable. Kenneth Rosen. Citizinvestor Helps Grab the Ears of Local<br />

Governments. September 18, 2012.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 103<br />

Crowdfunding for countries under<br />

US sanctions<br />

It is important to do your research before embarking on an online<br />

crowdfunding campaign. Most crowdfunding platforms have a support desk<br />

where you can send questions and ask for help and advice even before you<br />

launch your project. This is particularly true of the more reputable, sizable<br />

and international crowdfunding platforms such as Kickstarter and Indiegogo.<br />

These platforms also have online resources, such as the Kickstarter Creator<br />

Handbook. 221<br />

If your project is linked in any way to a country under US comprehensive<br />

sanctions (i.e. Cuba, Iran, North Korea, Sudan and Syria) and you are<br />

contemplating the use of an American crowdfunding platform, it is imperative<br />

that you contact the support desk and make them aware of your fundraising<br />

campaign and get their approval before you launch.<br />

However, do not expect these companies to know the sanctions regime<br />

pertaining to your country. It is your job to know all exemptions under US<br />

sanctions law and to make the relevant arguments to support your project.<br />

All documents related to the sanctions regime can be found on the website<br />

of the Department of Treasury. 222<br />

CROWDFUNDING<br />

4<br />

221 https://www.kickstarter.com/help/handbook.<br />

222 http://www.treasury.gov/resource-center/sanctions.


104<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

In the case of Sudan, the sanctions exemptions include any projects to<br />

be implemented in: “Southern Kordofan/Nuba Mountains State, Blue Nile<br />

State, Abyei, Darfur, and marginalized areas in and around Khartoum –<br />

referred to as ‘the Specified Areas of Sudan.’” 223<br />

The main obstacle facing the use of crowdfunding in US-sanctioned<br />

countries is the inability to conduct any commercial transactions online,<br />

since the use of credit cards is restricted and the transfer of funds from the<br />

US to Sudanese banks or to individuals inside Sudan is also prohibited.<br />

However, Sudanese civil society groups have successfully used online<br />

crowdfunding in the last couple of years. Examples include creative<br />

projects such as the short film OUR SUDAN, 224 as well as development or<br />

humanitarian projects such as the reconstruction of Al Huda School, which<br />

gives free basic education to 230 internally displaced students from the Nuba<br />

Mountains. 225 In both cases the main requirement was to have members of<br />

the Sudanese diaspora involved so that a bank account associated with the<br />

fundraising campaign could be opened in a non-sanctioned country.<br />

Moreover, Sudanese civil society groups have also succeeded in<br />

crowdfunding by appealing to diaspora communities through social media<br />

and organizing transfer of funds to individual bank accounts that are then<br />

sent to Sudan (see case study on Nafeer below).<br />

Although Sudan does not yet have an official mobile money platform, such<br />

as M-Pesa, 226 which is popular in Kenya and other parts of East Africa,<br />

transferring funds via mobile phone credit is becoming more accepted<br />

around the country. It is increasingly common for the general population<br />

and members of civil society to transfer funds by sending mobile phone<br />

credit to a cell phone for exchange into cash. This looks like a good option<br />

for in-country, offline crowdfunding activities, given the restrictions on credit<br />

card use under the US sanctions, which limit the use of American online<br />

crowdfunding platforms. However, transferring funds via phone credit<br />

also has the disadvantage of not being as transparent, outreaching and<br />

centralized as an online platform.<br />

223 Department of the Treasury. Office of Foreign Assets Control. Sudan Sanctions<br />

Program. Updated November 5, 2013.<br />

224 YouTube. Northernlightist. OUR SUDAN. June 6, 2013.<br />

225 Indiegogo. Campaign. Dalia Haj-Omar. Support Nuba Mountain IDP Students.<br />

December 13, 2013-January 19, 2014.<br />

226 https://en.wikipedia.org/wiki/M-Pesa.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 105<br />

Choosing a crowdfunding platform<br />

Indiegogo vs. Kickstarter<br />

Indiegogo and Kickstarter are the most popular online crowdfunding<br />

platforms. Although at first glance they may look similar, there are<br />

fundamental differences. Both platforms offer a huge community of users<br />

and high credibility; and both require that those initiating a project choose<br />

a funding goal as well as a deadline and a media pitch for the fundraising<br />

campaign. Additionally, those who start projects on the two platforms have<br />

100 percent ownership over their projects. But beyond these similarities<br />

there are important differences that include: (1) the fundraising model<br />

(an all or nothing approach with Kickstarter versus a flexible model with<br />

Indiegogo); (2) the types of projects that can be funded; (3) the processing<br />

fees; and (4) perks or rewards to supporters. The table on the next page<br />

compares and captures in more detail the differences between Indiegogo<br />

and Kickstarter based on those four categories.<br />

Although some people may turn away 227 from using Kickstarter because of<br />

its “all or nothing” crowdfunding model, the company defends that approach<br />

by stressing that it is motivating and will make people work hard at spreading<br />

the message and seeking support for their projects. 228 They add that to date<br />

44 percent of projects on the Kickstarter platform have been funded. It also<br />

makes more sense to go for an “all or nothing” crowdfunding option if your<br />

project cannot be implemented unless it meets the set goal. If that’s not the<br />

case because, for example, you are seeking funds both online and offline to<br />

meet your goal or you do not need to meet your goal to launch your project,<br />

then a flexible crowdfunding option may be more suitable for you.<br />

Finally the insistence on a physical reward/perk may be a problem in countries<br />

where the postal service is poor, non-existent or unreasonably expensive,<br />

as is the case in many developing countries. Going with Indiegogo’s more<br />

flexible model that allows you to skip on offering rewards to your backers<br />

might be an advantage in this case. Another option is to choose perks that<br />

are memorable but non-physical, such as an invitation to an event or a<br />

Skype chat with the project creator.<br />

CROWDFUNDING<br />

4<br />

227 ZDNeT. Ken Hess. Despite its popularity, I hate Kickstarter. November 22, 2013.<br />

228 https://www.kickstarter.com/help/faq/kickstarter+basics?ref=faq_<br />

subcategory#Kick.


106<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Comparison between Indiegogo and Kickstarter229230231232<br />

Indiegogo<br />

1. A flexible model of fundraising. You<br />

can choose a fixed funding approach<br />

where you only receive the funds<br />

collected if you reach your fundraising<br />

goal; or a flexible funding approach<br />

where you collect all funds raised<br />

even if you do not reach your goal.<br />

Note that processing fees are<br />

higher for the flexible fundraising<br />

choice (see below under “fees” for<br />

more details).<br />

2. What is funded? There are no<br />

restrictions to the type of projects<br />

funded as long as projects do not<br />

violate Indiegogo’s terms of use. 229<br />

Kickstarter<br />

1. An all or nothing fundraising model.<br />

You have to meet your indicated goal<br />

to receive the donations raised. If you<br />

do not meet your goal all funds are<br />

returned to their donors, and you are<br />

charged nothing. Kickstarter says<br />

that 44 percent of all projects in its<br />

platform get funded.<br />

2. What is funded? Kickstarter restricts<br />

the use of its platform to concrete<br />

creative projects under the categories<br />

of: art, comics, design, fashion,<br />

film, food, music, photography,<br />

publishing, technology and theatre.<br />

Recently Kickstarter added two new<br />

categories, 230 journalism and crafts,<br />

in addition to 94 subcategories. 231<br />

You cannot start your project before<br />

getting an approval from Kickstarter.<br />

More is explained in the “Our Rules”<br />

section of the website. 232<br />

229 https://www.indiegogo.com/about/terms.<br />

230 Kickstarter Blog. Introducing Two <strong>New</strong> Categories: Journalism and Crafts. June<br />

11, 2014.<br />

231 Kickstarer Blog. A subcategory for everything. April 18, 2014.<br />

232 https://www.kickstarter.com/rules.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 107<br />

Indiegogo<br />

3. Fees. If you meet your funding goal<br />

Indiegogo charges 4 percent of all<br />

funds collected regardless of whether<br />

you chose a fixed funding or flexible<br />

funding campaign. Non-profits based<br />

in the US pay 3 percent. If you do not<br />

meet your funding goal, for a flexible<br />

funding campaign, Indiegogo collects<br />

9 percent of all funds raised; with<br />

a fixed funding campaign you get<br />

nothing and all donations are returned<br />

to funders. Add to this amount credit<br />

card processing fees that can range from<br />

3 to 5 percent. For more details check<br />

out the “fees and pricing” page. 233<br />

4. Perks or rewards. Indiegogo gives<br />

its users the option of opting out<br />

of offering a perk, but they also<br />

encourage users of their platform<br />

to create perks and say that,<br />

“campaigns offering perks raise 143<br />

percent more money than those<br />

that do not. Perks help you attract<br />

a larger audience, make people feel<br />

more valued for their contributions,<br />

and help you spread the word about<br />

your campaign.” 235 They define perks<br />

as “nonmonetary incentives that<br />

campaigners offer in exchange for<br />

your contribution.” 236<br />

233234235236<br />

Kickstarter<br />

3. Fees. Kickstarter collects a<br />

5 percent fee applied to all funds<br />

collected, in addition to a 3 to 5<br />

percent credit card processing fee. 234<br />

4. Perks or rewards. Kickstarter<br />

requires that all its users offer rewards<br />

as incentives to donors/backers.<br />

They emphasize that, “every project’s<br />

primary rewards should be things<br />

made by the project itself”, and advise<br />

keeping prices at a reasonable level.<br />

Rewards can also be in the form<br />

of “creative experiences,” such as<br />

invitations to the set during filming a<br />

movie, or a public acknowledgement,<br />

or even writing a personal thank you<br />

note or post card.<br />

CROWDFUNDING<br />

4<br />

233 https://support.indiegogo.com/hc/en-us/articles/204456408-Fees-Pricing.<br />

234 https://www.kickstarter.com/help/fees.<br />

235 http://go.indiegogo.com/playbook/life-cycle-phase/setting-up-your-campaign.<br />

236 http://go.indiegogo.com/playbook/contributing.


108<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Comparison: Indiegogo vs. Kickstarter<br />

KICK<br />

STARTER<br />

A flexible<br />

fundraising<br />

model<br />

Dream<br />

Project<br />

funding model<br />

A fixed<br />

fundraising<br />

model:<br />

all or nothing<br />

No restrictions<br />

Humanitarian<br />

Small Business<br />

Creative projects<br />

what is funded<br />

Restricted to<br />

Creative projects<br />

Fixed funding: 4%<br />

or<br />

Flexible funding: 9%<br />

+<br />

Credit card processing: 3-5%<br />

fees<br />

Fees on funds collected: 5%<br />

+<br />

Credit card processing: 3-5%<br />

Optional<br />

Required<br />

perks & rewards


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 109<br />

CASE STUDY 4: SUDAN<br />

The story of #Nafeer:<br />

crowdsourcing in action<br />

During the floods that impacted Khartoum, Sudan’s capital, in August<br />

2013, a youth-based initiative called Nafeer 237 (inspired by the Sudanese<br />

tradition of collectively helping those in need) used a variety of social<br />

media and ICT tools 238 that included Facebook, 239 Twitter, 240 Flickr, 241<br />

and a crisis map. 242 With these tools they mobilized a huge network<br />

of up to 8,000 volunteers who raised funds online and offline, and<br />

provided relief to impacted citizens much faster than the government<br />

and United Nations agencies.<br />

Most of the donations came from Sudanese businesses and diaspora<br />

communities via announcements on Facebook 243 and Twitter 244 in the<br />

form of in-kind and cash donations. The Facebook message 245 below<br />

announcing the need for life jackets and vehicles is an example of the<br />

calls for donations posted on social media. There were also similar<br />

calls for the mobilization of volunteers to specific locations that needed<br />

immediate relief.<br />

CROWDFUNDING<br />

4<br />

237 The <strong>New</strong> York Times. Isma’il Kushkush. As Floods Ravage Sudan, Young<br />

Volunteers Revive a Tradition of Aid. August 29, 2013.<br />

238 Pambazuka <strong>New</strong>s. Mobilization in the age of parallel media. September 12,<br />

2013.<br />

239 https://www.facebook.com/gabaileid.<br />

240 Twitter. @NafeerCampaign.<br />

241 Flickr. Nafeer Sudan.<br />

242 https://khartoumflood.crowdmap.com.<br />

243 https://www.facebook.com/photo.php?fbid=553885294658675&set=<br />

a.551661601547711.1073741828.551549528225585&type=1<br />

244 https://twitter.com/NafeerCampaign/status/372129849730957312.<br />

245 https://www.facebook.com/NafeerInitiative/posts/552400651473806


110<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

The majority of the volunteers on the ground were not the traditional<br />

civil society crowd. Many were professionals who came from the private<br />

sector and had useful technical skills that are usually lacking in a typical<br />

civil society organization. Nafeer had its own engineering and medical<br />

teams. A Crisis Map, 246 for example, was created by a young female<br />

software engineer while she was trapped in her house during the heavy<br />

rains. The map was eventually used by Nafeer, NGOs and the United<br />

Nations to locate the most needy areas for relief. Even the government’s<br />

Civil Defence “hotline” was referring people to Nafeer.<br />

Nafeer, however, did face some technical challenges linked to the<br />

impact of US sanctions on free access to the internet. Nafeer’s<br />

members were unable to use a more centralized online crowdfunding<br />

platform because PayPal closed Nafeer’s account, citing the sanctions<br />

on Sudan. In a tweet referring to operational obstacles that the mayor<br />

of Khartoum was creating for the group, Amjad Fareed, one of the<br />

initiators of Nafeer, said:<br />

The Americans closed #Nafeer’s PayPal account because of<br />

the sanctions on Sudan. What challenges are we supposed<br />

to deal with, those from the Mayor of Khartoum or from the<br />

Americans? 247<br />

246 The Daily Beast. Amanda Sperber. Crowdsourcing Help for Flooded Sudan.<br />

August 15, 2013.<br />

247 https://twitter.com/amjedfarid/status/370239060427550720.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 111<br />

US sanctions made the collection of funds from diaspora groups much<br />

more burdensome, since it was not possible to streamline the process<br />

and centralize it in one place. Multiple account numbers of diaspora<br />

focal points (mainly in the Gulf, Europe and the United States) were<br />

posted on Twitter and Facebook for those willing to donate. Despite this<br />

decentralization challenge, Nafeer members continued to make public<br />

all the funds donated via their Facebook page. 248 This created a new<br />

model of transparency for civil society, regardless of the challenge of<br />

tracking donations that came from many countries and were sent to<br />

multiple bank accounts of members of the diaspora.<br />

The Nafeer campaign marked the first time crowdfunding was<br />

attempted in Sudan during a national humanitarian crisis. Since then<br />

there have been several crowdfunding efforts by civil society, not all<br />

linked to developmental or relief efforts. They required that Sudanese<br />

in the diaspora assist with linking the crowdfunding page with a bank<br />

account in a non-sanctioned country. 249<br />

CROWDFUNDING<br />

4<br />

248 https://www.facebook.com/photo.php?fbid=122169817953591&set=<br />

pb.121094181394488.-2207520000.1387320960.&type=3&theater.<br />

249 http://www.kickstarter.com/projects/1551224532/our-sudan-a-short-film-toinspire-a-new-generation?ref=live.


112<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Photo taken of volunteers during the “paint and run” school renovation campaign<br />

led by the Sudanese youth group Education Without Borders, December 2012.<br />

How to run a successful<br />

crowdfunding campaign<br />

Most crowdfunding platforms have tips 250 on their websites to help you set<br />

up your campaign. 251 However, as mentioned before, crowd fundraising<br />

is not a new concept; the internet has just made it more accessible to<br />

everyone. Hence, some of the traditional tips for fundraising that apply offline<br />

also apply online. Crowdfunding is not automatic or easy; be prepared to<br />

work hard at planning before, during and after the launch of your campaign.<br />

Below are some essential steps you need to take: 252<br />

• Invest in building a community of supporters long before you launch<br />

a fundraising campaign. Have a monthly newsletter that goes to all your<br />

networks. <strong>Use</strong> social media to expand the reach of your network and to<br />

communicate your successes and share your work. Engage with your<br />

audience and invite them to your events.<br />

• Create a crowd fundraising campaign team. Campaigns led by a<br />

team get more donations than those led by individuals.<br />

• Set specific, time-bound and realistic objectives. Your supporters<br />

need to have a concrete idea about how their donations will be used.<br />

Indicate three to four clear and measurable objectives.<br />

• Your fundraising monetary goal needs to be realistic and conservative.<br />

To calculate it, do an actual cost analysis of how much you need to<br />

250 https://support.indiegogo.com/hc/en-us/articles/204458068-Checklist-Before-<br />

Creating-A-Campaign.<br />

251 https://www.kickstarter.com/help/handbook#defining_your_project.<br />

252 CrowdFundBeat. Ben Lamson. How to Successfully Crowdfund for Your<br />

Nonprofit. November 14, 2013.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 113<br />

13 steps to running a<br />

crowdfunding campaign<br />

13 steps to running a crowdfunding campaign<br />

1. Build a community of supporters<br />

2. Create crowdfunding team<br />

3. Set clear and time-bound objectives<br />

4. Set a realistic monetary goal<br />

5. Decide length of campaign<br />

6. Prepare a media pitch<br />

7. Pick an image and a title<br />

8. Have a soft launch<br />

9. Spread the word<br />

10. Reach donors online and/or offline<br />

11. Thank your backers<br />

12. Update your supporters<br />

13. Capture lessons learned<br />

• implement your project; then look at the size of your network of “real”<br />

supporters. Indiegogo advises that you should plan to get about 30<br />

percent of donations from your direct network and community. 253 Do not<br />

forget to filter in the processing fees of the crowdfunding platform that<br />

you will use, as well as the cost of awards or perks (if you choose to offer<br />

them). Be conservative and choose a minimum funding amount that will<br />

allow you to meet your objectives.<br />

CROWDFUNDING<br />

4<br />

• The length of your campaign should allow you to build momentum<br />

and at the same time engage with your audience for a sufficient amount<br />

of time. Shorter campaigns are usually more effective. Remember that<br />

your campaign will require human resources as well as a lot of follow-up<br />

and interaction with your audience, so 30 days is much more reasonable<br />

than 60.<br />

• Prepare your communication/media pitch. Both Indiegogo and<br />

Kickstarter stress that projects with a video are much more successful.<br />

A video does not have to be expensively produced or of professional<br />

253 http://go.indiegogo.com/playbook/life-cycle-phase/setting-up-your-campaign.


114<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

quality, but make sure that it is short (three to four minutes) and explains<br />

who you are, what you want to do and how. The more personal your<br />

video the better, so try to tell a personal and compelling story – people<br />

often donate because they believe in individuals. Also, write a short<br />

narrative description that you can add below the video and send to your<br />

closest friends and community via email.<br />

• Pick an image and title. Your title should be short and should capture<br />

the essence of your project.<br />

• Do a soft launch. Draw a list of your closest friends and supporters and<br />

contact them before the official launch to ask them to make a contribution<br />

within the first three days. This will help you start above the zero mark.<br />

Building this early momentum will encourage those outside your network<br />

to donate when they see that others have already done so.<br />

• Spread the word. Count on your personal network of friends, family<br />

and professional supporters first and foremost. Prepare email lists and a<br />

description of the project beforehand. Include clear directions on how to<br />

donate and provide a link to your campaign page. <strong>Use</strong> social media to<br />

spread the word and ask your main supporters to share.<br />

• Reach your donors wherever they are. If some of your essential<br />

supporters are shy with using technology to donate, reach them in<br />

the way that is most comfortable for them. Consider hosting an offline<br />

fundraiser to supplement your crowdfunding campaign. Allow supporters<br />

to give via cash or checks or to send credit via text messaging.<br />

• Thanking your backers is key. All crowdfunding platforms send an<br />

automatic confirmation and a thank you message to donors after each<br />

contribution. However, a personal message of gratitude goes a long<br />

way. Some perks include handwritten postcards and thank you notes.<br />

Thanking your donors during the campaign allows you to update them<br />

on how your campaign is doing and to ask them to help out by recruiting<br />

a friend or two and spreading the message to their networks.<br />

• Long-term communication and updates. Once your crowdfunding<br />

campaign is over, plan to send two to three updates during the<br />

implementation phase of your project. They can be short videos or text<br />

supported by photos. Long-term communication after your fundraiser is<br />

done builds credibility with your community and demonstrates impact<br />

that ensures future support.<br />

• Learn and capture lessons. Most crowdfunding platforms have<br />

analytics and metrics to track the progress of your campaign in real time.<br />

You can know things like: the number of people who visited your page;<br />

the geographic location of your backers; how much is being donated<br />

per day; and where the donations are coming from (email solicitations,<br />

Facebook, Twitter, etc.). In Indiegogo, for example, you can also see how<br />

much everyone in your campaign team is raising. Collectively this data<br />

can be used to help you see what outreach strategies are working best,<br />

and what you may need to change for the next time.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 115<br />

Interview:<br />

Crowdfunding for the OUR<br />

SUDAN short film<br />

Sudanese civil society’s creative and artistic efforts are starting to<br />

slowly turn to the internet and specifically to crowdfunding to secure<br />

financial support for projects. Recently, we have especially seen this<br />

in the creation of short films such as OUR SUDAN 254 and Adam &<br />

Howa, 255 which screened at the Cannes Film Festival “2015 Diversity<br />

in Cannes Short Film Showcase,” in May 2015. With Sudan suffering<br />

from US imposed sanctions, Sudanese citizens inside Sudan are not<br />

able to do any financial transactions online. Hence the support of<br />

Sudanese diaspora members with crowdfunding is essential.<br />

Dimah Abdulkarim, who was part of the OUR SUDAN support<br />

team that oversaw the crowdfunding process 256 joined us for this<br />

interview. She is an American-Sudanese, has a background in<br />

international development and peacebuilding, and has been living in<br />

Sudan for the last two years, working as an organizer in supporting<br />

grassroots civil society environmental organizations.<br />

CROWDFUNDING<br />

4<br />

254 YouTube. Northernlightist. OUR SUDAN. June 6, 2013.<br />

255 Kickstarter. Sarra Idris and Mitch Stockwell. Adam & Howa: A short fantasy film<br />

set in Khartoum, Sudan.<br />

256 Kickstarter. The Our Sudan Team. Our Sudan: A Short Film to Inspire A <strong>New</strong><br />

Generation. February 17, 2013.


116<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Q1. Can you explain your role as a recently returning Sudanese<br />

from the diaspora, and the basic requirements that make<br />

crowdfunding technically possible?<br />

In Sudan, I worked with development NGOs, and I’ve participated<br />

in grassroots work on a volunteer basis with organizations working<br />

on environmental issues and peacebuilding. But I quickly realized,<br />

soon after arriving to Sudan and after having become acquainted<br />

with people within my own generation (I’m in my 20s), that Sudanese<br />

young people learn of others with similar interests through online<br />

platforms. They also make contact and mobilize through online<br />

platforms, the biggest being Facebook.<br />

Crowdfunding in Sudan is still not yet developed or extensively<br />

utilized or even realized. Most people here are not familiar with<br />

online opportunities for funding, mainly because crowdfunding sites,<br />

such as Kickstarter or Indiegogo, are developed in countries that<br />

economically sanction Sudan.<br />

So even though in Sudan [there are] great ideas for business<br />

projects, or interesting technological or scientific inventions, or<br />

social enterprise and initiatives, those who are also aware of these<br />

platforms for raising funds online have no easy access to Kickstarter<br />

or Indiegogo or any other online crowdfunding platforms. They<br />

are, unfortunately, not allowed to access established, reliable<br />

crowdfunding sites.<br />

The sole technical requirement to be able to access crowdfunding<br />

sites [from inside Sudan], is to have access to online banking in a<br />

non-sanctioned country, so donors can wire money through their<br />

accounts. Donors must also have non-sanctioned bank accounts,<br />

and as you know Sudan is not one of those countries.<br />

Q2. OUR SUDAN chose Kickstarter as the platform to execute<br />

the crowdfunding. Did you consider or research other<br />

crowdfunding platforms? Why did you choose Kickstarter?<br />

We were simply more familiar with Kickstarter at the time. We<br />

chose Kickstarter because, after looking at some of the other online<br />

crowdfunding options, we decided we simply liked Kickstarter more.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 117<br />

Q3. Was it hard to reach your designated funding goal? Was it<br />

nerve-wracking given that with Kickstarter you have to meet<br />

your goal or more, otherwise you do not collect anything at<br />

all?<br />

The challenges that we faced came in different forms, shapes and<br />

sizes. It was nerve-wracking using Kickstarter. We had to really work<br />

to reach our funding goals. We knew from the onset though that<br />

it wasn’t enough to simply make the video project cool, upload it<br />

to the Kickstarter page, and then sit back and watch the thumbs<br />

rolling. We had to solicit our friends and family by sending emails,<br />

making calls, and redirecting them to our Kickstarter page. We also<br />

created a Facebook page and a Twitter account which generated<br />

visibility for the short film and it sourced a lot of potential individual<br />

donors.<br />

The challenge that we faced was that we wanted to source people<br />

in Sudan as potential donors, we didn’t want to just stick to the<br />

Kickstarter page and the Kickstarter account mode of fundraising.<br />

We attempted other fundraising options. We approached some of<br />

the local businesses here, for instance, for sponsorship and support,<br />

some of whom followed through.<br />

Q4. Can you speak about the challenges you faced – specific<br />

to the technology and also more generally to fundraising?<br />

We have faced challenges, some of which we are still facing actually,<br />

even after the finishing of the filmmaking aspect of the project.<br />

For example, part of the Kickstarter mandate is that people who<br />

give above a certain amount, even a small amount, receive gifts in<br />

exchange for their donations. Our gifts came in the form of t-shirts<br />

and posters and some other merchandise items. The project team<br />

decided that the items must be made in Sudan. Being that we’re<br />

operating in a sanctioned country, we’ve experienced (and still are<br />

experiencing) the difficulty of shipping these items to all 130 of our<br />

donors who are all over the world. It’s not as straightforward as<br />

posting the items from Khartoum and mailing them. Just like we had<br />

to rely on those of us in the project team who have offshore bank<br />

accounts to establish the Kickstarter account, we also have to rely<br />

on those of us who can travel so they can ship these items from a<br />

non-sanctioned country.<br />

CROWDFUNDING<br />

4<br />

This is actually quite heavy; remember we are a small project team.<br />

All of us have full-time jobs. Imagine carrying all this merchandise<br />

with you from Sudan to the UK, in order to mail it to our individual<br />

donors in Canada and the US.


118<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

It is a requirement from Kickstarter that you give gifts to your donors.<br />

The idea is that you incentivize donors to give to a particular project<br />

more money by saying, “Hey, if you give me a dollar, you’ll get a<br />

thanks or a pat on the back maybe. If you give me 10 dollars you<br />

might get a bumper sticker. If you give me 50 you’ll get a t-shirt ...” It’s<br />

like an incentive system with donors to feel gratified in giving. I think<br />

that’s the Kickstarter model. I don’t know if Indiegogo is the same,<br />

or if other crowdfunding sites are necessarily quite as incentivized.<br />

As far as challenges are concerned, regarding the project execution<br />

in Sudan, Sudan is not a country known for its civil rights – in fact<br />

we’re known recently for quite the opposite. The OUR SUDAN<br />

project is essentially a media project, unaffiliated with the State, and<br />

it’s also a not-for-profit project. So we knew what dangers there<br />

were for us in the making of this film and the risks involved in its<br />

message. There were a lot of challenges in that sense that coupled<br />

with the difficulties and obstacles in accessing crowdfunding sites<br />

from a sanctioned country like Sudan.


CHAPTER 5<br />

Digital security<br />

DIGITAL SECURITY<br />

5


120<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CHAPTER 5<br />

Digital security<br />

This chapter is a good start for organized groups or<br />

institutions that want to broaden their discussions<br />

and understanding of digital security, and put in<br />

place practical steps for digital security policies. It<br />

aims to heighten the sensitivity of groups at risk of<br />

targeting because of their online activities to the<br />

importance of digital security by exposing those<br />

groups to global and regional practices and trends<br />

regarding infringements on net freedoms imposed<br />

by State entities.<br />

Groups at risk include journalists, citizen journalists, activists and members<br />

of civil society. This chapter will also point users of this guidebook to useful<br />

resources for safe communication when browsing the internet and when<br />

using mobile devices, in addition to resources for digital activists and<br />

online journalists in need of special assistance during physical or technical<br />

emergencies.<br />

The chapter includes three expert interviews. One interview focuses on the<br />

basic measures of digital protection for those who have never taken steps to<br />

ensure their digital security. The second interview discusses the technology<br />

of “mesh networking” that can be used to connect communities in case of<br />

a network interruption or internet blackout, or in the absence of connectivity<br />

due to poor infrastructure. The final interview is with an active member of<br />

Sudanese civil society who reflects on the challenges facing civil society<br />

when it comes to protecting digital privacy.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 121<br />

Why digital security matters: global<br />

trends and the decline in net<br />

freedoms<br />

The shadow of Edward Snowden’s revelations<br />

It is no longer a contested matter. Today we are living through the lowest<br />

point of optimism when it comes to the transformative power of the internet<br />

since it was first created, a little over a quarter of a century ago. Perhaps<br />

nothing got us closer to this sentiment than Edward Snowden’s revelations<br />

in June 2013, which exposed the massive scale of the US National<br />

Security Agency’s (NSA) digital surveillance and monitoring activities that<br />

targeted regular citizens and extended beyond the US to friendly European<br />

countries. 257<br />

This historic leak prompted worldwide concern and debate about the right<br />

to digital privacy when using information and communication technologies<br />

(ICTs), including the internet. Data localization also became an issue, since the<br />

NSA leaks led some countries (Russia, Vietnam, Germany, India and others)<br />

to attempt to regulate the flow of data within their borders by requesting that<br />

international internet and technology companies store communication data<br />

pertaining to their citizens in servers inside their countries. 258 Internet freedom<br />

advocates have expressed concern that data localization is detrimental to<br />

a free and open internet, because it will make it easier for countries to spy<br />

on their citizens, may slow technological innovation, and may fragment the<br />

internet by limiting global communications and e-commerce. 259<br />

If any good has come from Snowden’s leaks so far, it is perhaps the global<br />

pushback by civil society and some nation States and a wider recognition<br />

that the right to privacy online is a human right. In December 2013, the<br />

United Nations General Assembly passed a resolution on “the right to<br />

privacy in the digital age,” which urges member States to review and reverse<br />

any policies that violate the right to digital privacy. 260 The resolution stresses<br />

that rights offline must be protected online and reminds member states that<br />

257 Wired. The Most Wanted Man in the World. August 2014.<br />

258 Forbes. Katharine Kendrick. Risky Business: Data Localization. February 19,<br />

2015.<br />

259 Lawfare Research Paper Series. Benjamin Wittes. Jonah Force Hill: The Growth<br />

of Data Localization Post Snowden. July 21, 2014.<br />

260 United Nations General Assembly. Resolution 68/167: The right to privacy in the<br />

digital age.<br />

DIGITAL SECURITY<br />

5


122<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

the right to privacy is included under existing international human rights<br />

law, specifically the International Covenant on Civil and Political Rights,<br />

ratified by 167 countries so far. 261 In March 2015 the UN Human Rights<br />

Council appointed its first ever Special Rapporteur on the Right to Privacy,<br />

whose mandate is to analyze and monitor the right to digital privacy globally,<br />

give guidance to governments and companies, and receive input from all<br />

relevant stakeholders, including civil society. 262<br />

Expansive scope of internet freedom violations<br />

Before Snowden’s NSA leaks, it was usually non-democratic States that<br />

came under the spotlight for violating internet freedoms, including big<br />

violators of internet freedoms such as Cuba, Iran and China. All three<br />

countries are notorious for controlling free access to, as well as freedom of<br />

expression on, the internet through a variety of tactics that are also used by<br />

many other nations.<br />

These tactics include but are not limited to: (1) Blocking and filtering online<br />

content; (2) cyber attacks, of which the most aggressive are Distributed<br />

Denial of Service Attacks (DDoS); (3) blanket blocking of opposition<br />

websites, including social media; (4) shutting down the internet at times<br />

of political unrest, such as protests or elections; (5) take-down requests,<br />

where bloggers are intimidated into taking down content; (6) physical<br />

attacks, including the murder of online journalists, citizen journalists and<br />

digital activists (Syria being the most deadly country for digital activists<br />

and online journalists in 2013); (7) paying commentators to manipulate<br />

discussions online; (8) introducing new laws that limit internet freedoms;<br />

and (9) monitoring and surveillance that prompt users in less democratic<br />

countries to exercise self-censorship. 263<br />

Global decline in net freedoms: increase in<br />

restrictive laws and harsh penalties<br />

According to Freedom House’s annual global survey, Freedom on the Net<br />

2014, there was a global decline in internet freedoms for the fourth year in<br />

a row in the period between May 2013 and May 2014 (the report has been<br />

261 UN Office of the High Commissioner for Human Rights. The Right to Privacy in<br />

the Digital Age.<br />

262 Electronic Frontier Foundation. Kimberly Carlson and Katitza Rodriguez. UN<br />

Human Rights Council Appoints Special Rapporteur on the Right to Privacy.<br />

March 26, 2015.<br />

263 Freedom House. Sanja Kelly. Freedom on the Net 2013: Despite Pushback,<br />

Internet Freedom Deteriorates.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 123<br />

published annually since 2009). 264 “Out of 65 countries assessed, 36 have<br />

experienced a negative trajectory,” with more people being detained and<br />

persecuted for their digital activities in the last year alone than in any other<br />

year.<br />

A notable trend prevalent in both democratic and non-democratic countries<br />

surveyed by the Freedom on the Net 2014 report was the increase in new<br />

laws that limit internet freedoms: 19 countries surveyed passed new laws<br />

“that increased surveillance or restricted user anonymity.” 265 In democratic<br />

countries these laws are often linked to national security concerns. This is<br />

specifically the case in France where, in reaction to the Charlie Hebdo attack<br />

of January 2015, the French National Assembly approved a law in May<br />

2015 that would allow the country’s intelligence services to monitor citizen<br />

communications without judicial oversight. French civil society has launched<br />

a campaign to raise awareness and urge citizen action against the bill. 266<br />

Freedom House also notes that the penalties for online expression are often<br />

much harsher than for similar offline penalties. For example, in Ethiopia<br />

six bloggers belonging to a collective of bloggers known as the Zone 9<br />

Bloggers have been imprisoned since April 2014, under terrorism charges,<br />

for blogging about human rights and social justice issues. Their name<br />

reflects the name of a prison in Addis Ababa that has 8 zones. Expressing<br />

the sentiment that the whole country is becoming a prison, they called<br />

themselves zone9ers, and blogged under the motto “We Blog Because We<br />

Care” to increase the visibility of political prisoners, human rights abuses by<br />

the State and social and cultural issues. 267<br />

The Middle East and North Africa saw the highest number of arrests of<br />

social media users and bloggers in recent times. Especially repressive were<br />

the countries of the Persian Gulf. Perhaps one of the most visible online and<br />

offline campaigns for an imprisoned blogger in the last year was that for the<br />

Saudi blogger, Raif Badawi, who on May 2014 was sentenced by a criminal<br />

court in Jeddah to 10 years in prison, 1,000 lashes and a fine of more<br />

than USD 200,000. According to the court, Badawi had “insulted Islam”<br />

by setting up a liberal online platform that discussed religion and politics. 268<br />

264 Freedom House. Freedom on the Net 2014.<br />

265 Freedom House. Sanja Kelly, Madeline Earp, Laura Reed, Adrian Shahbaz,<br />

and Mai Truong. Freedom on the Net 2014: Tightening the Net: Governments<br />

Expand Online Controls. December 2014.<br />

266 Access. Despite opposition, France approves dangerous new surveillance law.<br />

May 5, 2015.<br />

267 http://trialtrackerblog.org.<br />

268 Global Voices Advocacy. Saudi Blogger Sentenced to 10 years in Prison, 1000<br />

Lashes. May 8, 2014.<br />

DIGITAL SECURITY<br />

5


124<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

CASE STUDY 5: SUDAN<br />

Internet freedoms in Sudan<br />

Sudan is no exception to the global trend. Since early 2011 there have<br />

been annually recurring street protests, mostly led and coordinated<br />

by youth who use social media to organize, mobilize and disseminate<br />

information. In response, the Sudanese government has increased<br />

its digital surveillance capacity, including the expansion of its Cyber<br />

Jihadist Unit. This unit (a department of the National Security and<br />

Intelligence Services) is responsible for the overarching surveillance of<br />

communications, including the tapping of phone calls of opposition<br />

groups, the hacking of social media, email accounts and opposition<br />

websites, and the intimidation of activists online.<br />

In the last decade, Sudan has invested heavily in its telecommunications<br />

infrastructure and by 2013 had a steadily increasing internet penetration<br />

rate of 23 percent (up from 21 percent in 2012 and 19 percent in<br />

2011). The mobile penetration rate was 75 percent by the end of<br />

2013, according to the International Telecommunication Union (ITU). 269<br />

There is healthy market competition amongst four telecommunications<br />

providers and in 2012 Sudan had the cheapest post-paid costs in the<br />

Middle East and North Africa. A growing number of citizens, especially<br />

youth, browse the internet on their phones.<br />

However, all of these infrastructural and economic advantages are<br />

highly compromised by the backdrop of a State that has little respect<br />

for the freedoms of expression, association, participation and peaceful<br />

assembly. The Sudanese regime is amongst the worst globally for<br />

obstruction of access to independent and diverse sources of information<br />

both offline and online.<br />

Since 2013, 270 Freedom House’s Freedom on the Net report has included<br />

a chapter on Sudan. In 2013 and 2014 Sudan was categorized as a<br />

“Not Free” country with a score of 65 (out of 100), as compared to 63<br />

in 2013. Out of 12 African countries surveyed, Sudan was one of three<br />

countries in the “Not Free” category, ranking eleventh – only ahead of<br />

Ethiopia. 271<br />

269 http://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx.<br />

270 Freedom House. Freedom on the Net 2013: Sudan.<br />

271 Freedom House. Freedom on the Net 2014: Sudan.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 125<br />

Foreign Surveillance Weapons: Hacking Team<br />

In early July 2015, the extent of Sudan’s National Security and<br />

Intelligence Services’ (NISS) investment in surveillance or spying<br />

software was exposed when the Italian company, Hacking Team,<br />

which provides surveillance software and hacking tools to government<br />

agencies globally, was itself hacked. 272 A trove of 400 GB of the<br />

company’s files, including invoices and emails, was downloaded and<br />

made public by an anonymous hacker. 273 The documents revealed that<br />

NISS was a client of Hacking Team until the end of 2014, and that it<br />

had paid a total of EUR 980,000 in 2012 for Remote Control System<br />

(RCS) software. This software allows governments to install “implants”<br />

on targeted computers and then steal private information from emails<br />

or skype calls; or even spy on users via their computer webcams.<br />

The leaked documents also showed that Hacking Team was having<br />

difficulties to train NISS on using its hacking software technology<br />

because NISS’s staff did not have English language skills and had<br />

limited computer literacy. Moreover, the United Nations Panel of Experts<br />

on Sudan had started investigating Hacking Team’s links to Sudan in<br />

late December 2014. However, regardless of several attempts to obtain<br />

information, Hacking Team insisted that Sudan was not their client.<br />

Additionally, concerns that Hacking Team is violating the European<br />

Commission’s (EC) sanctions regime against Sudan have prompted a<br />

Dutch member of the European Parliament, Marietje Schaake, to ask<br />

for an EC investigation into Hacking Team’s activities and its links to<br />

oppressive and/or sanctioned regimes like Sudan, Egypt, Ethiopia and<br />

Russia. 274<br />

#SudanRevolts (June-July 2012)<br />

In response to the wave of protests triggered by economic austerity<br />

plans – known as #SudanRevolts – that hit the country between June<br />

and July 2012, the Sudanese authorities implemented for the first<br />

time a large-scale crackdown on, and mass arrests of, citizens and<br />

activists using digital platforms to communicate, connect, coordinate<br />

and mobilize.<br />

DIGITAL SECURITY<br />

5<br />

272 MotherBoard. Here Are All the Sketchy Government Agencies Buyingn Hacking<br />

Team’s Spy Tech. July 6, 2015.<br />

273 https://wikileaks.org/hackingteam/emails<br />

274 Thread Post. EU Lawmaker Wants Answers on Hacking Team Sales to<br />

Sanctioned Countries. July 7, 2015.


126<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

The attacks on cyber dissidents during and after #SudanRevolts<br />

included the detention of digital activists, such as Usamah Mohammed 275<br />

(for posting a YouTube video), for up to two months; the forced exile<br />

of Sudan’s most prominent video blogger, Nagla’a Sid Ahmad; 276 and<br />

the kidnapping and torture of the Darfurian online journalist Somia<br />

Hundosa. 277 Moreover, one of the most high profile political detainees,<br />

Jalila Khamis from the Nuba Mountains, spent nine months in detention<br />

without charge. When she finally faced trial in December 2012, the main<br />

evidence against her was a YouTube video 278 taken by Sid Ahmad,<br />

in which Khamis testified about the shelling of civilians in the Nuba<br />

Mountains by the Government of Sudan. 279 (See chapter 2 for the case<br />

study on the digital campaign for Jalila Khamis.)<br />

Migration of newspapers online and internet<br />

blackouts during the September 2013 protests<br />

Since the separation of South Sudan in 2011, the deteriorating situation<br />

of press freedoms, particularly in the traditional print media, has led<br />

to a highly restrictive environment with an unprecedented number of<br />

confiscations of newspapers after printing – a practice that has severely<br />

impoverished newspapers. There have also been increased incidents<br />

of detentions and summons for interrogation of local journalists and<br />

digital journalists; banning of journalists from writing; and bringing of<br />

court cases against them by state entities. This has all contributed to a<br />

new trend: the establishment of online newspapers. Examples include<br />

the establishment of Al-Taghyeer 280 and Al-Tareeg 281 in 2013 and 2014<br />

respectively.<br />

The Sudanese regime tried to adapt to this trend by extending its<br />

censorship arm online to indulge in technical violence targeting<br />

independent and opposition voices. This included hacking the websites<br />

275 Global Voices. Maha El-Sanosi. Sudan: Protests Trigger Arrests of Twitter<br />

Activists. June 23, 2012.<br />

276 Girifna. A Citizen Journalist and Activist in Forced Exile. October 7, 2012.<br />

277 Girifna. NISS Tortures Journalist Somia Hundosa. November 3, 2012.<br />

278 https://www.youtube.com/watch?v=CmA7pS83EBA.<br />

279 Girifna. Freedom on the Net (2013). October 13, 2013.<br />

280 http://www.altaghyeer.info.<br />

281 http://www.altareeq.info/ar.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 127<br />

of Sudan Tribune 282 and 3ayin 283 in April 2014 and hacking Sudanile,<br />

Hurriyat and 3ayin during the national elections in April 2015. 284<br />

During the protests of September 2013, Sudan experienced a<br />

nationwide 24-hour internet blackout that Renesys, the worldwide<br />

internet intelligence company, stated was “the largest governmentdirected<br />

Internet blackout since Egypt in January 2011.” 285 The<br />

Sudanese government denied that the blackout was intentional on its<br />

part, and blamed a fire in the offices of the telecom provider Canar.<br />

But many believe that the blackout was orchestrated by the National<br />

Telecommunications Corporation (NTC), a government agency, as part<br />

of the Sudanese government’s response to the protests – which were<br />

heavily documented by citizens who circulated videos and images<br />

online that reflected the violent response of the regime. In response<br />

to this government claim, Renesys stated that the internet blackout<br />

“strongly suggests a coordinated action to remove Sudan from the<br />

Internet.” 286<br />

282 Sudan Tribune. Sudan Tribune website hacked; Machar not target of<br />

assassination attempt. April 2, 2014.<br />

283 http://www.3ayin.com.<br />

284 Hurriyat (Arabic blog). Journalists for Human Rights (JHR): Security Agency’s<br />

<strong>New</strong> Hacking Campaign on Sudanese Websites. April 16, 2015.<br />

285 http://research.dyn.com/2013/09/internet-blackout-sudan.<br />

286 Dyn Research: the new home of renesys. Internet Blackout in Sudan. September<br />

25, 2013.<br />

DIGITAL SECURITY<br />

5


128<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Protection against viruses,<br />

spyware and malware<br />

Making sure that your computer is free of viruses and other malware is<br />

a basic step to protecting your data and privacy. Before you worry about<br />

encrypting your communications, browsing and data, you should ensure<br />

the safety of your entire operating system and hardware. The table below<br />

gives an overview of some of the threats linked to viruses and malware,<br />

and proposes preliminary steps to address them in order to get complete<br />

protection.<br />

The antivirus and anti-malware software programs suggested below (Avast<br />

and Spybot) are free and have been vetted by international digital security<br />

experts. There are, however, other paid options that are equally reliable.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 129<br />

Viruses and spyware: What they are and how to<br />

prevent them287288289290<br />

Type of malicious software 287<br />

Virus<br />

(Viruses<br />

include<br />

worms,<br />

macroviruses,<br />

trojans and<br />

backdoors.)<br />

What does it do? Destroys,<br />

damages and infects data, files,<br />

hard drives and external drives.<br />

How does it spread? Internet,<br />

email attachments, malicious<br />

websites, USB keys.<br />

Protection methods<br />

<strong>Use</strong> an antivirus at all<br />

times (free or paid).<br />

Avast 288 is a highly<br />

reputable free antivirus<br />

software for both PCs and<br />

Macs, and it automatically<br />

updates when connected<br />

to the internet. 289<br />

Note: do not install more<br />

than one antivirus at a<br />

time because it will slow<br />

down your computer and<br />

stop the antiviruses from<br />

working efficiently.<br />

Spyware<br />

Trojan<br />

Worm<br />

What does it do? While<br />

spyware does not destroy<br />

information or files, it runs on<br />

your computer without your<br />

knowledge and spies on every<br />

move you make with your<br />

mouse, as well as websites you<br />

visit and information you type.<br />

This information can then be<br />

communicated to someone else.<br />

How does it spread? Internet,<br />

email, malicious websites, USB<br />

keys.<br />

What does it do? Can destroy<br />

information or spy on you.<br />

How does it spread? Some<br />

websites can trick you into<br />

installing malicious software or<br />

can automatically download<br />

malware.<br />

What does it do? Destroys<br />

files and information.<br />

Note: Both trojans and<br />

worms are usually running in<br />

your computer without your<br />

knowledge or consent.<br />

Spybot 290 is a free<br />

program that protects<br />

from spyware and<br />

malware (i.e. trojans and<br />

worms). It works for PCs<br />

only.<br />

Note: Using Spybot<br />

with an antivirus<br />

simultaneously allows<br />

complete protection for<br />

PCs since in PCs an<br />

antivirus alone does<br />

not catch spyware and<br />

malware (trojans and<br />

worms).<br />

DIGITAL SECURITY<br />

5<br />

287 Security in-a-Box. Protect Your Device from Malware and Hackers.<br />

288 https://www.avast.com/en-us/index.<br />

289 https://www.avast.com/en-us/index.<br />

290 https://www.safer-networking.org.


130<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Using phones and mobile devices<br />

securely<br />

This section will introduce the concept of end-to-end encryption and will<br />

discuss adding an additional level of security to passwords through the use<br />

of two-step verification or two-factor authentication. We also discuss basic<br />

tips to use mobile devices securely, as well as useful applications that can<br />

be downloaded on smartphones for improved mobile security, including<br />

secure text messaging, phone calls and video conferencing, sharing of<br />

images/photos, and sending secure and synchronized alarm messages to<br />

your network when you are in danger.<br />

End-to-end encryption<br />

The key to secure communication online is open source “end-to-end<br />

encryption.” The Freedom of the Press Foundation in its publication<br />

Encryption Works defined encryption as:<br />

[T]he process of taking a plaintext message and a randomly<br />

generated key and doing mathematical operations with the two<br />

until all that’s left is a scrambled, ciphertext version of the message.<br />

Decryption is taking the ciphertext and the right key and doing<br />

more mathematical operations until the plaintext is recovered. 291<br />

Thanks to the hard work of citizen cryptographers and the open source<br />

community, it is now possible to have adequate security online (even<br />

when using our phones) due to a decent selection of free open source<br />

applications. 292 However, ensuring your privacy when using encrypted<br />

applications requires that your network of friends and colleagues are also<br />

using the same digital protection measures. This needs discipline and<br />

education of your network about safer alternatives.<br />

Basic steps to mobile phone security<br />

Your phone is a tracking device. Even when it is switched off it is sending<br />

signals to the service towers around you allowing your mobile provider to<br />

geo-locate you easily. 293 The only way to stop this tracking is to switch off<br />

your phone and take the SIM card and battery out (or wrap your phone<br />

in aluminum foil if the battery is not removable). If you are tweeting (or<br />

Facebooking) sensitive information with your phone or smartphone, such as<br />

live-tweeting during a protest, make sure to:<br />

291 Micah Lee. Encryption Works: How to Protect Your Privacy in the Age of NSA<br />

Surveillance. Freedom of the Press Foundation. July 2013.<br />

292 Open source refers to programming code that is made public and that can be<br />

scrutinized in detail for flaws and corrected by other cryptographers.<br />

293 http://vimeo.com/57886217.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 131<br />

• Disable the geo-locator on your smartphone.<br />

• Create a new anonymous social media account.<br />

• Assume that your phone can be lost, stolen or confiscated by<br />

the authorities. Make sure that (1) your phone has a complex pin code,<br />

and (2) you log out of your social media accounts (and other sensitive<br />

applications) after each use.<br />

Tightening the grip on passwords through<br />

two‐step verification<br />

If you are wondering if your password is strong enough, Passfault is an<br />

online platform that evaluates the strength of your passwords by calculating<br />

the time it takes to crack each password. 294 All you have to do is plug in<br />

your password and you will get an analysis of the extent of its strength<br />

or weakness. Passfault does not save passwords tested by users of its<br />

website.<br />

Other than using long and complex passwords that are at least 20 characters<br />

long and considering the use of a password database, such as KeePass 295<br />

or LastPass 296 , using two-step verification (or two-factor authentication)<br />

can offer great added protection. This is particularly true if the password to<br />

your email or social media accounts is compromised. Two-step verification<br />

ensures that it is actually you – the owner of the account – who is accessing<br />

the account. A code is either sent to your mobile phone or generated by<br />

a smartphone application like Google Authenticator. 297 You then have to<br />

enter the code in order to access your account. This feature is becoming<br />

increasingly popular and is available with Google, 298 Facebook (Facebook<br />

calls it login approvals), 299 Twitter, 300 Microsoft 301 and others.<br />

294 https://passfault.appspot.com.<br />

295 http://keepass.info.<br />

296 https://lastpass.com.<br />

297 Google. Install Google Authenticator.<br />

298 Google. Google 2-Step Verification. At: https://www.google.com/landing/2step.<br />

299 Facebook. Andrew Song. Introducing Login Approvals. May 12, 2011.<br />

300 Twitter. Getting started with login verification. May 22, 2013.<br />

301 Microsoft. About two-step verification.<br />

DIGITAL SECURITY<br />

5


132<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Video and additional reading<br />

on mobile security and passwords<br />

● Video from Tactical Technology Collective: Your mobile phone, our<br />

tracking device. 302<br />

● Security in-a-Box has a chapter dedicated to mobile security with<br />

valuable tips on how to: Stay secure when using mobile phones 303<br />

and smartphones; 304 minimize the chances of being spied on<br />

when using your phone; and maximize the chances of staying<br />

anonymous. 305 (Available in Arabic. 306 )<br />

● Security in-a-Box: Create and maintain secure passwords. 307<br />

(Available in Arabic. 308 )<br />

● The Electronic Frontier Foundation: How to Enable Two-Factor<br />

Authentication on Twitter (And Everywhere Else). 309<br />

Encrypted applications for mobile phones<br />

The Electronic Frontier Foundation (EFF), 310 a leading organization in the<br />

fight for digital rights including digital privacy, has scrutinized more than 40<br />

messaging tools and applications and created a scorecard to tell users how<br />

secure these messaging applications are. Some of the most commonly<br />

used messaging tools and applications, such as Facebook chat, Google<br />

hangout, WhatsApp, Viber, and Skype, ranked poorly when it came to<br />

privacy and security. 311 Below are six phone messaging apps that got a full<br />

score or an almost full score according to the EFF’s evaluation of their safety<br />

and security.<br />

302 http://vimeo.com/57886217.<br />

303 Security in-a-Box. <strong>Use</strong> mobile phones as securely as possible.<br />

304 Security in-a-Box. <strong>Use</strong> smartphones as securely as possible.<br />

305 https://securityinabox.org/chapter-10.<br />

306 For mobile phones: https://securityinabox.org/ar/chapter_10. For smart phones:<br />

https://info.securityinabox.org/ar/chapter_11.<br />

307 Security in-a-Box. Create and maintain secure passwords.<br />

308 Security in-a-Box. Create and maintain secure passwords. (In Arabic.)<br />

309 Electronic Frontier Foundation. Parker Higgins. How to Enable Two-Factor<br />

Authentication on Twitter (And Everywhere Else). May 28, 2013.<br />

310 https://www.eff.org/about.<br />

311 Electronic Frontier Foundation. Secure Messaging Scorecard: Which apps and<br />

tools actually keep your messages safe? November 3, 2014.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 133<br />

Encrypted text messaging<br />

Cryptocat 312 is a free open source chat, file and photo-sharing application<br />

that can be used on your computer’s browser and iPhones (there is no<br />

Android application yet but one is planned for release). Additionally,<br />

Cryptocat can be used with Facebook to ensure secure chatting via<br />

Facebook messenger.<br />

Not only does Cryptocat use end-to-end encryption, it also ensures that<br />

messages are encrypted from the user’s side so that everything that enters<br />

Cryptocat’s servers is already encrypted. Hence, even the developers of<br />

Cryptocat cannot read your messages.<br />

You can download a plugin for Cryptocat on a number of browsers, including<br />

Safari, Chrome and Firefox. Another allure of Cryptocat is that you can chat<br />

anonymously. It is very easy to use and does not require that you open an<br />

account. To start a chat you have to login through your browser or phone<br />

application; choose a “conversation name” and “nickname;” and then share<br />

the conversation name with people you would like to talk to, via encrypted<br />

email or any other safe method. Each time you use Cryptocat, you can<br />

choose a different “conversation name” and “nickname.” There is no saved<br />

record of your chat. The moment you close the conversation it is all gone.<br />

surespot 313 is a free open source encrypted messaging application that<br />

works on both iPhones and Android. It permits texting, voice messaging<br />

and the exchange of images. surespot allows you to have multiple identities<br />

on one device. For added security, each time you open the application you<br />

will have to input your password.<br />

DIGITAL SECURITY<br />

5<br />

312 https://crypto.cat.<br />

313 https://www.surespot.me.


134<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Video and additional reading<br />

on secure mobile messaging apps<br />

International Elevate Award 2014: Cryptocat. 314 A video that explains<br />

what Cryptocat is and how it works.<br />

What’s up with Crypto in WhatsApp? 315 This article explains why the<br />

popular phone messenger WhatsApp is still not fully secure regardless<br />

of the announcement in November 2014 that the app is now encrypted<br />

end-to-end.<br />

Your iPhone Can Finally Make Free, Encrypted Calls. An article about<br />

Signal, the first encrypted calling app for the iPhone. 316<br />

Encrypted phone calls and voice chatting<br />

RedPhone 317 is a free open source application that allows end-to-end<br />

encrypted phone calls for Android phones. RedPhone uses your phone<br />

number to make calls so you do not need to create another identifier. It allows<br />

you to use the main dialer on your phone and call using a WiFi connection<br />

or your phone data plan. The calls are encrypted as long as you are calling<br />

someone who is also using RedPhone or its equivalent for the iPhone, Signal.<br />

Signal 318 is the first free open source and encrypted voice call app for the<br />

iPhone (released in mid-2014). It is compatible with RedPhone (both Signal<br />

and RedPhone are made by the same company, Open Whisper Systems 319 ).<br />

Silent Phone 320 is made by the company Silent Circle, 321 which makes<br />

high-end encrypted applications for corporate clients. Silent Phone is<br />

therefore not a free application. It works with both Android and iPhones, and<br />

each subscriber gets a 10-digit number. When calling those not using Silent<br />

Phone, only one side of the conversation is encrypted.<br />

314 https://vimeo.com/elevatefestival/cryptocat.<br />

315 Me & My Shadow. What’s up with crypto in WhatsApp? December 14, 2014.<br />

316 Wired. Andy Greenberg. Your iPhone Can Finally Make Free, Encrypted Calls.<br />

July 29, 2014.<br />

317 https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone.<br />

318 https://itunes.apple.com/app/id874139669.<br />

319 https://whispersystems.org/#privacy.<br />

320 https://play.google.com/store/apps/details?id=com.silentcircle.silentphone&hl=en.<br />

321 https://silentcircle.com/#apps.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 135<br />

Jitsi 322 is a free, encrypted off-the-record (OTR) chat and video conferencing<br />

tool that completely replaces voice and instant messaging programs such as<br />

Google Hangouts and Skype. It supports many popular instant messaging<br />

and telephony protocols including SIP, Jabber/XMPP (and hence Facebook<br />

and Google Talk), AIM, ICQ, MSN and Yahoo! Messenger.<br />

Jitsi’s video conferencing option on your phone or computer’s browser can<br />

be accessed at https://meet.jit.si. You do not even need to open an account<br />

to use Jitsi. Jitsi creates a unique URL once you login that you may share<br />

with any number of people you want to include in the call. Remember to use<br />

encrypted email/messaging when you share the unique URL with others you<br />

are inviting. You can also protect the conversation by setting a password<br />

(use the lock icon on the top). Jitsi allows complete sharing of documents<br />

and attachments. It also works well in settings where the internet is slow.<br />

Jitsi can be downloaded as a software for PCs and Macs.<br />

Alerting family and friends in case of danger: The phone<br />

app Panic Button<br />

In mid-2014 Amnesty International 323 released Panic Button, 324 which is<br />

an app targeted at human rights defenders and activists at risk of sudden<br />

arrest, kidnapping or torture. Panic Button is an Android application that<br />

sends an SMS alert message and your location to a network of up to three<br />

contacts to let them know that you are in danger. To work well, however,<br />

the alert message that Panic Button sends needs to be set up in advance<br />

and your “emergency contacts” need to be notified ahead of time so they<br />

can act swiftly. To trigger an alarm message, users of Panic Button have to<br />

rapidly press the phone’s power button five times in five seconds until they<br />

feel a vibration.<br />

DIGITAL SECURITY<br />

5<br />

322 https://jitsi.org.<br />

323 Wired.co.uk. Olivia Solon. App turns power button into power button for activists<br />

at risk. June 23, 2014.<br />

324 https://panicbutton.io/#home.


136<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Additional resources for mobile security:<br />

The Guardian Project<br />

The Guardian Project 325 provides a host of free open source<br />

applications for mobile devices including applications for encrypted<br />

phone calls (Ostel), 326 using a secure browser (Orbot) 327 on your phone,<br />

and chatting or messaging securely (ChatSecure). 328<br />

Mobile Security Guide 329 from the Guardian Project is a step-by-step<br />

guide prompted by questions: Your responses point you to the phone<br />

application most suited for a specific need.<br />

325 https://guardianproject.info/apps.<br />

326 https://guardianproject.info/apps/ostel.<br />

327 https://guardianproject.info/apps/orbot.<br />

328 https://guardianproject.info/apps/chatsecure.<br />

329 https://guardianproject.info/howto.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 137<br />

Resources for digital activists<br />

at risk<br />

With the global increase in surveillance and online censorship by<br />

governments, and the decline in freedom of expression online that involves<br />

unprecedented threats to online journalists as well as bloggers, digital<br />

activists and normal users of social media outlets, the need to provide both<br />

technical and physical assistance to digital activists at risk is rising. Below<br />

are a few organizations that provide a range of services (both technical and<br />

financial) to human rights defenders, journalists and digital activists.<br />

Access Now Digital Security Helpline. 330 This international NGO<br />

(headquartered in <strong>New</strong> York) has a responsive 24-hour security helpline,<br />

based out of Manila, San Jose and Tunis. It supports human rights<br />

defenders by giving technical support and personalized recommendations<br />

and guidance on improving secure communications and digital security and<br />

bolstering the security of the infrastructure of websites and social media<br />

against attacks. The helpline also does face-to-face consultations and<br />

referrals for capacity-building and trainings.<br />

Committee to Protect Journalists (CPJ) 331 provides direct assistance<br />

to journalists at risk and their families for both digital and non-digital<br />

emergencies. Support includes: Legal funds for journalists in prison;<br />

relocation to safe havens; support for political asylum cases; and medical<br />

assistance. CPJ also has a useful Journalist Security Guide 332 that targets<br />

journalists operating in dangerous environments and gives them advice on<br />

risk assessment and digital security.<br />

Frontline Defenders. 333 This Irish NGO has had a security grants program<br />

since 2001 that targets human rights defenders at risk from a range of<br />

dangers, including: Assistance with digital and communications security;<br />

physical security; legal and medical support; and financial support to<br />

families of imprisoned human rights defenders. It funds both emergencies<br />

and general security requests for up to 7,500 Euros.<br />

Deflect. 334 This project provides free and specific technical assistance to<br />

independent media, human rights organizations and activists suffering from<br />

distributed denial of service (DDoS) hacking attacks that threaten to bring<br />

down their websites and censor their voice online. The Deflect project’s<br />

technology allows organizations and individuals who qualify for assistance<br />

to have websites that are resilient to DDoS attempts. The eligibility<br />

DIGITAL SECURITY<br />

5<br />

330 https://www.accessnow.org/pages/tech#Digital%20Security%20Helpline.<br />

331 https://cpj.org/campaigns/assistance/what-we-do.php.<br />

332 https://cpj.org/reports/2012/04/journalist-security-guide.php.<br />

333 Frontline Defenders. Security Grants Programme.<br />

334 https://deflect.ca.


138<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

requirements include organizations that have suffered from DDoS attacks in<br />

the past and fear future attacks. 335<br />

Digital Defenders Partnership (DDP). 336 Hivos (an international NGO<br />

based in the Netherlands and supported by the Dutch government) has a<br />

program for human rights defenders focused on digital activists. Support<br />

includes tools to circumvent censorship and provide assistance, in the form<br />

of small grants, to people facing digital emergencies; and legal protection<br />

to bloggers and activists who are on trial due to their online expression. 337<br />

Emergency financial assistance is also made available to civil society and<br />

media organizations under digital attack to help them mitigate threats and<br />

create threat models and response strategies. 338<br />

Digital First Aid Kit 339 is a useful self-diagnostic tool designed to help<br />

human rights defenders, bloggers and activists who are facing digital threats<br />

to better understand the risks to which they are exposed. The kit begins by<br />

enabling users to establish a secure communication and then goes through<br />

a series of questions about the user, and his or her devices and specific<br />

situation. This helps users to understand the challenges they face and<br />

when to request help from a specialist. The kit includes sections on account<br />

hacking, seizure of devices, malware infections, and DDoS attacks.<br />

Seed Alliance 340 is a small grants 341 program with geographic coverage that<br />

spans Africa, Asia and Latin America and a focus on: Improving the quality of<br />

digital openness; inclusion of minorities in nascent networked communities;<br />

bolstering digital access and freedom of expression online (including<br />

freedom of association, privacy, security and consumer rights); supporting<br />

innovative solutions; and deepening information networks. It also develops<br />

content, applications and solutions for timely and large-scale dissemination<br />

of information. The Seed Alliance is a collaboration established between the<br />

FIRE, 342 FRIDA 343 and ISIF Asia 344 grants programs. 345 The Africa region is<br />

supported by the African Network Information Center (AFRINIC).<br />

335 https://wiki.deflect.ca/wiki/Get_Protected.<br />

336 www.digitaldefenders.org.<br />

337 https://digitaldefenders.org/#subsection-emergency-grants.<br />

338 Ideas can be sent to ddp@hivos.nl for review of proposal ideas. Twitter handle:<br />

@DigiDefenders.<br />

339 http://digitaldefenders.org/digitalfirstaid.<br />

340 http://www.fireafrica.org/seed_alliance.<br />

341 http://www.fireafrica.org/grant.<br />

342 http://www.fireafrica.org.<br />

343 http://programafrida.net.<br />

344 http://isif.asia.<br />

345 For more information about grant categories see http://www.fireafrica.org/grant.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 139<br />

Foundations for safe online<br />

browsing and communication<br />

There is not one magical tool that will completely protect the privacy of<br />

your communications when you are surfing the internet. In this section we<br />

discuss a number of tools and software that, when used together, can<br />

give you an adequate level of protection. They include: HTTPS encrypted<br />

browsing; end-to-end encrypted emails; anonymous browsing through<br />

using Tor Project and/or a Virtual Private Network (VPN); and off-the-record<br />

(OTR) chat/instant messaging.<br />

HTTPS encrypted browsing: Means your<br />

connection to the internet is secure<br />

Make sure to check for HTTPS or for a lock icon in the address bar of your<br />

browser. The additional “s” indicates that your connection (or information in<br />

transit) to the internet is secure and encrypted, hence protecting you from<br />

being intercepted. (This technology is called Secure Sockets Layer or SSL<br />

encryption.) HTTPS secure connection is particularly important if you are<br />

about to give personal information, such as banking or financial details or your<br />

email password. The Electronic Frontier Foundation and Tor Project created<br />

an HTTPS Everywhere extension for Firefox, Chrome, Firefox for Android<br />

phones and Opera browsers. HTTPS Everywhere extension automatically<br />

switches thousands of sites from the insecure HTTP to HTTPS. 346<br />

Nowadays most email providers (including Gmail, Hotmail and most<br />

recently Yahoo!) have an HTTPS encrypted connection. However, Gmail<br />

is more secure than other email companies, because Google submits<br />

a “transparency report” every six months. (Hotmail and Yahoo! have<br />

also started issuing transparency reports, but they are not as frequent<br />

and extensive as Google’s). 347 Google was a pioneer in issuing the first<br />

transparency report back in 2010, which urged companies like Facebook,<br />

Twitter and others to follow suit.<br />

DIGITAL SECURITY<br />

5<br />

346 Electronic Frontier Foundation. HTTPS Everywhere.<br />

347 Google. Transparency Report. At: http://www.google.com/transparencyreport.


140<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

End-to-end encrypted emails just got easier!<br />

Pretty Good Privacy (PGP) is the most secure protocol for end-to-end<br />

encrypted email. However, it is complex to use because it requires the<br />

creation of a public key that you share with others (to ensure that it is actually<br />

you), and a private key that you use to decrypt or open messages. It is also<br />

obligatory for both parties to communicate using the same method. This<br />

means that only those who are technically advanced use it. 348<br />

End-to-end encryption in email is nonetheless still highly recommended<br />

and a new generation of simpler tools is emerging. This includes Tutanota<br />

encrypted email, 349 a new open-source (German-based) encrypted email<br />

platform. Tutanota does not store passwords of its users (if you lose your<br />

password you have to create a new account). If you are communicating with<br />

someone not using Tutanota you can still encrypt emails with a password.<br />

Everything in your message is automatically encrypted, including the subject<br />

line, content and attachments (unencrypted messages are stored encrypted<br />

in Tutanota’s servers). This new end-to-end encrypted email platform is<br />

therefore much easier to use than traditional PGP encrypted email.<br />

348 Micah Lee. Encryption Works: How to Protect Your Privacy in the Age of NSA<br />

Surveillance. Freedom of the Press Foundation. July 2013.<br />

349 https://tutanota.com.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 141<br />

Essential Digital Security Resources<br />

The Surveillance Self-Defense 350 project by the Electronic Frontier<br />

Foundation (available in Arabic 351 ). This resource has extensive howto<br />

toolkits that include tips and information on safer communication<br />

tailored for use by Mac users, journalism students, activists, protestors,<br />

online journalists, digital security experts, and LGBTQ youth. It also<br />

includes a “security starter pack” for beginners.<br />

Security in-a-Box, 352 by Tactical Tech and Frontline Defenders, has<br />

practical how-to’s for configuring secure communications software,<br />

and advice on how to use social media platforms and mobile phones<br />

more securely. (Available in Arabic. 353 )<br />

Speak Safe: <strong>Media</strong> Workers Toolkit for Safer Online and Mobile<br />

Practices. 354 A concise toolkit produced by Internews that targets<br />

media professionals. (Available in Arabic. 355 )<br />

Me & My Shadow 356 is a website created by the Tactical Technology<br />

Collective that helps you trace the shadows you leave online and gives<br />

you tools to manage them. (Available in Arabic. 357 )<br />

350 https://ssd.eff.org/en.<br />

351 https://ssd.eff.org/ar.<br />

352 https://securityinabox.org/en.<br />

353 https://info.securityinabox.org/ar.<br />

354 http://www.internews.org/sites/default/files/resources/Internews_SpeakSafeToolkit.<br />

pdf.<br />

355 http://www.internews.org/sites/default/files/resources/Internews_SpeaksafeToolkit_<br />

Arabic_2013-06.pdf.<br />

356 https://myshadow.org.<br />

357 https://myshadow.org/ar.<br />

DIGITAL SECURITY<br />

5


142<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Anonymous browsing: Tor and VPN<br />

What is Tor and what is it useful for?<br />

Tor is a free open source software that allows you to stay anonymous when<br />

you are online. 358 Tor does the following:<br />

• Protects your privacy by hiding your IP address (a very good indicator of<br />

your location).<br />

• Allows you to circumvent government censorship of blocked websites.<br />

• Encrypts all traffic within the Tor network.<br />

• Stops websites from tracking your online browsing habits.<br />

Tor is powered by a global network of more than 4,000 volunteer servers<br />

called nodes. When someone uses Tor to visit a website, instead of going<br />

to the website directly they are redirected to a connection that goes through<br />

three nodes (or circuits) before it finally exits into the public internet. It is<br />

like taking a long and convoluted way to your house because you suspect<br />

someone is following you, and you want to lose them. This distributed<br />

network makes those who are monitoring your traffic think that your location<br />

(IP address) is that of the last node your traffic exited from. Each time you<br />

use Tor you will have a different IP address because the path of your nodes<br />

will differ.<br />

How does Tor work?<br />

To use Tor you need to download the Tor browser bundle. 359 However, if<br />

you use Tor you still need to be diligent with security as Tor will only<br />

encrypt your information when you are inside the Tor network. Once<br />

you reach your final destination on the internet you will need to ensure that<br />

your connection is secure by using an HTTPS encrypted connection.<br />

A disadvantage often noted about Tor is that it slows down your internet<br />

connection because your traffic is being routed through multiple relays or<br />

358 https://www.torproject.org/index.html.en.<br />

359 https://www.torproject.org/projects/torbrowser.html.en.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 143<br />

nodes. Tor is therefore not recommended for streaming video. Additionally, if<br />

someone is monitoring your traffic, they can see that you are using Tor and,<br />

in some countries like China, Internet Service Providers (ISPs) have blocked<br />

access to Tor entry nodes or relays. 360<br />

Some videos to watch<br />

Tor Animation. 361 This animation was created by the Tor Project. It<br />

explains what Tor is and how it works. (Available in Arabic. 362 )<br />

How Tor Works. 363 An MIT video that illustrates how Tor uses a series of<br />

nodes or relays to protect anonymity.<br />

Psiphon-Beyond Borders. 364 A video that introduces Psiphon’s VPN<br />

service.<br />

360 MIT Technology Review. How China Blocks the Tor Anonymity Network. April 4,<br />

2012.<br />

361 YouTube. Tor Project. Tor Animation. May 17, 2015.<br />

362 https://youtu.be/6v0ga4f2myY.<br />

363 MIT Video. Conrad Warre. How Tor Works.<br />

364 YouTube. Psiphon. Psiphon – Beyond Borders. March 23, 2015.<br />

DIGITAL SECURITY<br />

5


144<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Virtual Private Network (VPN)<br />

If you are looking for anonymous browsing that has all the benefits of<br />

Tor software in addition to a fast internet connection, a VPN might be a<br />

good choice. Like Tor, VPN offers anonymous browsing, hides the user’s<br />

IP address, bypasses censorship or blocked websites and encrypts traffic<br />

within the VPN’s network.<br />

VPN is faster because users are passing from their computers directly to the<br />

servers of the VPN service provider or company. However, it is important to<br />

note that the VPN provider has access to your traffic and information, and<br />

therefore must be trusted. 365 Moreover, a VPN connection will not protect<br />

you once you are on the public internet. As is the case with Tor, you will still<br />

need to connect securely via an encrypted HTTPS channel.<br />

Examples of trusted VPN services include:<br />

Securitykiss. 366 Created by a Polish company, Securitykiss works on both<br />

PCs and Macs and costs USD 50 per year.<br />

Psiphon 367 is a free open source VPN that works only on PCs and Android<br />

phones. It was created by Canadian activists.<br />

365 Surveillance Self-Defense. A Project of the Electronic Frontier Foundation.<br />

Choosing the VPN That’s Right for You.<br />

366 http://www.securitykiss.com.<br />

367 https://psiphon.ca/en/index.html.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 145<br />

Off-the-Record (OTR) chatting<br />

Who does not rely on at least one popular instant messaging (IM) or chatting<br />

tool, such as Facebook’s messenger, MSN, or Google’s Chat? Even if<br />

you connect to these services via an encrypted HTTPS connection, the<br />

fact is that these companies have your information and can hand it to the<br />

authorities if they are subjected to sufficient pressure.<br />

Off-the-Record (OTR) is an encryption layer or plugin that can be added to<br />

any IM or chat tool that supports OTR. 368 OTR tools do not host IM services<br />

themselves. They are third party clients that connect to the services run by<br />

others. Hence, OTR allows end-to-end encrypted conversations through<br />

many popular chatting services like MSN or Facebook messenger. Another<br />

thing that OTR chat does is verify the identity of those with whom you are<br />

talking. OTR services generate a new encryption key for every conversation.<br />

This feature is called “perfect forward secrecy” (PFS) and it holds true for<br />

zRTP-encrypted VoIP tools, as well as the chatting and video conferencing<br />

tool Jitsi, which was mentioned earlier in this chapter.<br />

Examples of free and open source OTR clients are Pidgin 369 and Adium. 370<br />

Pidgin is a chat program for PCs (Windows, Linux and UNIX operating<br />

systems) that permits you to log into multiple chat services at the same time<br />

(i.e. Google Talk, MSN, Yahoo!) using one interface. Pidgin is compatible with<br />

many chat networks and is available in a lot of languages, including Arabic.<br />

Adium, on the other hand, works with Macs (OS X operating systems) and<br />

supports a wide range of IM services.<br />

Otr.to is an easy to use browser-based OTR encrypted chat that works<br />

with Chrome or Firefox and does not require you to open an account or<br />

download any software. When you start a chat you are given a unique URL<br />

and ID. The chat starts when someone else opens the link or enters your ID.<br />

DIGITAL SECURITY<br />

5<br />

368 https://otr.cypherpunks.ca.<br />

369 http://pidgin.im/about.<br />

370 https://www.adium.im/about.


146<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Interviews<br />

The basics of digital security<br />

In this interview we talk about your digital security with Eric<br />

Johnson, who works on aid projects aimed at improving access<br />

to information in developing countries – especially relating to cyber<br />

liberty and online safety for journalists and civil rights activists.<br />

Q1. You’ve worked with groups such as journalists and civil<br />

society activists and these groups often sit on sensitive<br />

information, and therefore a situation of loss of important<br />

information or data is highly possible. What are the most<br />

basic measures of protection that you advise for those who<br />

have never taken any steps to ensure their digital security?<br />

1. Update your software. Make sure you’re running only the<br />

very newest versions of all your software (your OS, your<br />

productivity software, your browsers, Skype, Acrobat Reader,<br />

Java VM) – fully patched, fully updated – and make sure your<br />

software stays patched/updated, always, all the time. This might<br />

require that your software (especially Microsoft Windows and<br />

Microsoft Office) be licensed. I realize this is a cost, but it’s a<br />

necessary one, and it’s not a lot. (For example, right now I buy<br />

MS Windows update licenses for about USD 90 per year, and<br />

Office costs USD 2 per month.)<br />

2. Wholly encrypt your hard drive. If you’re running the newest<br />

version of your operating system (Windows or Mac OS X), then<br />

you have whole-hard-drive encryption available to you (built in),<br />

but it’s not on. Turn it on!


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 147<br />

3. <strong>Use</strong> https not http. Ensure all your online communication (IM,<br />

VoIP, email, social networking) is encrypted while traversing<br />

your country’s cyberspace. For IM & VoIP, use Skype. For email,<br />

use any of Gmail, Hotmail, or Yahoo. For SMS, use Facebook.<br />

The main thing is, if you’re using a browser, make sure the URL<br />

in the address bar always (while you’re communicating) starts<br />

with HTTPS (not just HTTP) – it’s that “S” which is providing the<br />

encryption.<br />

4. Keep a good antivirus. “Good” means reputable and everyday-self-updating,<br />

as well as running at all times on all the<br />

computers you use.<br />

5. Turn on multi-factor authentication everywhere possible,<br />

especially email, Facebook (Google calls it “two-step verification”).<br />

6. Do not use mobile phones for anything for which you want<br />

security.<br />

7. Back up regularly – perhaps in the cloud – so that if your<br />

device is lost/stolen, you still have your data.<br />

8. Never enter your password into a computer you do not control<br />

(e.g. a cybercafé computer).<br />

9. <strong>Use</strong> strong passwords:<br />

● Minimum 12 characters.<br />

● None of the passwords known by hackers to be used by<br />

everyone (e.g. “123456” or “password”).<br />

● Nothing an attacker could guess (your birth date, your<br />

spouse’s name, your dog, your hometown) – ideally, no<br />

“words.”<br />

● A mix of uppercase and lowercase letters, numbers, and<br />

punctuation.<br />

● Unique password (i.e. do not reuse passwords across sites).<br />

You can use a password manager like LastPass 371 to generate<br />

secure passwords, that stores and remembers your passwords.<br />

Q2. What are the more advanced steps that can be taken<br />

by groups most at risk from situations like confiscation of<br />

equipment, hacking or surveillance?<br />

If you take all the above steps, you’re in good shape. If you want to<br />

be more secure you can also:<br />

1. <strong>Use</strong> OpenPGP to encrypt your email “end-to-end” – but<br />

this requires that both ends use it (e.g. Enigmail, SED, AGP,<br />

Mailvelope).<br />

DIGITAL SECURITY<br />

5<br />

371 https://lastpass.com.


148<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

2. <strong>Use</strong> Off-the-Record (OTR) to browse anonymously and<br />

encrypt your IM (instant messages) more securely even than<br />

Skype – which is already encrypted. (For example, use IM<br />

programs like Pidgin, Jitsi, ChatSecure.)<br />

3. <strong>Use</strong> ZRTP (for example, Ostel) to encrypt your VoIP more<br />

securely even than Skype.<br />

4. <strong>Use</strong> a proxy (such as Tor or a VPN) for all your online activity to<br />

prevent your ISP from knowing what you’re doing online.<br />

But really, these are overkill. Every compromise I’ve heard of (and<br />

that’s a lot!) was a result of not following the advice I give above<br />

under Q1. So, do not pay attention to the answers to Q2 unless/<br />

until you’ve taken care of all the advice given under Q1. Prioritize!<br />

Q3. For activists and journalists who use social media heavily,<br />

either to raise awareness about an issue, share their work or<br />

to organize and mobilize, what steps can be taken to protect<br />

(1) their privacy and the privacy of those with whom they<br />

communicate, and (2) their physical security (especially since<br />

all new mobile devices have GPS technology that gives away<br />

your location).<br />

1. Beyond following the above steps for yourself, get your friends to<br />

follow these steps too.<br />

2. Turn off your phone.<br />

Physical security is far harder.<br />

Q4. In Sudan civil society, institutions and individuals suffer<br />

mainly from three types of cyber attacks: (1) the hacking of<br />

institutional websites (often news sites); (2) the hacking of<br />

Facebook accounts; and (3) the hacking of email accounts.<br />

(The last two sometimes result in permanent loss of access<br />

to the accounts.) What kind of measures can protect from<br />

such attacks?<br />

1. Keep your website’s hosting software thoroughly up-todate.<br />

You cannot count on your hosting company to do this –<br />

you have to regularly check it yourself.<br />

2. Make sure everyone who has login credentials follows the<br />

answers to your Q1; and<br />

3. Isolate a site’s login from the site itself (in other words, use a<br />

different domain/IP address).<br />

See the answers to Q1.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 149<br />

Mesh networking as a solution for poor<br />

connectivity or network interruptions<br />

Reliable internet access is not something we can always take for<br />

granted. Network interruptions are common during environmental<br />

crises, such as major storms and earthquakes. We have also seen<br />

governments shut down the internet during political unrest in places<br />

like, Egypt, Syria and Sudan.<br />

Is there a solution that can be available to wider audiences and<br />

close communities during an internet blackout? Apparently yes,<br />

and it is called “mesh networking.” To learn about this we talked to<br />

Nat Meysenburg, a Technologist at Open Technology Institute 372<br />

in Washington D.C. Nat is working with the Commotion Project, 373<br />

whose main mission is to provide open source communication tools<br />

for mobile phones, computers, and other wireless devices to create<br />

decentralized mesh networks.<br />

Q1. Can you explain for us the concept of mesh networks and<br />

give examples of settings in which its implementation has<br />

been useful?<br />

A mesh network is a network where each device in the network<br />

can talk to all the devices it can see, and pass information through<br />

all the devices it can detect. As a result you can pass information<br />

along a chain of devices. This is different from wireless setups that<br />

are deployed in most of the world, where your device is talking to<br />

one other device, and that one other device has been wired into the<br />

internet. In the case of mesh networks the devices don’t even<br />

have to be on the internet to communicate with each other.<br />

They are speaking from one device to another over a networked<br />

chain, which allows for rapidly changing networks based on needs.<br />

This is a very useful technology based on a number of scenarios.<br />

One is just giving basic access to information to communities where<br />

that access isn’t there. One example is in the town of Saeeda in<br />

Tunisia. There is a mesh network there that, while not connected<br />

to the internet, has the photocopy of the Arabic Wikipedia and<br />

thousands of public domain French ebooks and other resources.<br />

So, without being connected to the internet, this small town is able<br />

to get some of the rich information and content-sharing that the<br />

internet has to offer.<br />

In other places where the infrastructure hasn’t been built there is the<br />

Abaarso School of Technology in Somaliland, 374 which has a mesh<br />

network so that the students there can learn how to do internet-web<br />

projects and share with each other inside the school without having<br />

DIGITAL SECURITY<br />

5<br />

372 https://www.newamerica.org/oti.<br />

373 https://commotionwireless.net.<br />

374 http://www.abaarsoschool.org.


150<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

to depend on their weak and sometimes non-existent uploading to<br />

the internet (which is an optical link that runs across the desert). In<br />

that instance we are talking about a place in the world where no one<br />

is going to build a network infrastructure, so the school is able to do<br />

it themselves.<br />

The last example is another place where no one will build a network<br />

infrastructure, which is a bit surprising because it is in <strong>New</strong> York<br />

City. It is in Red Hook, Brooklyn, a neighborhood that has one of<br />

the largest concentrations of public housing. A mesh network was<br />

set up by a community organization there that provides access and<br />

applications to the people in the neighborhood. Red Hook is a good<br />

example of not only being able to provide constant and consistent<br />

[internet] access to that community, but also during Hurricane<br />

Sandy in 2012, the mesh network was one of the only pieces<br />

of communications infrastructure that was left standing in<br />

that neighborhood. It was used by the disaster responders to<br />

connect people [impacted by the hurricane] to the internet and find<br />

out what was going on and how they can get help.<br />

Q2. Where does the Commotion Project come in? What is its<br />

main goal and what services does it provide?<br />

The Commotion Project aims to be a fully open source wireless<br />

mesh networking platform that will target devices that are already<br />

on the ground in places. The idea is, in order to make this cheap<br />

and easy to do, we need to use what already exists in the (local)<br />

market all over the world, and then write the software to use that<br />

hardware so that all these devices already out there can be joined<br />

into a mesh network. Our goal is to support as much hardware as<br />

we can, and for communities to be installing commotion and setting<br />

up commotion. Our ultimate goal is one that is almost impossible<br />

to measure, which is for people to be installing a commotion mesh<br />

network that we don’t even know about.<br />

Q3. In order to benefit from the software services provided<br />

by the Commotion Project, what kind of technical know-how<br />

and/or hardware is required to get a mesh network up and<br />

running?<br />

There is a learning curve with wireless mesh technologies. This<br />

includes some basic skills of radio and a little knowledge about the<br />

software. Also, there is a huge community component such as,<br />

how to talk to your neighbors about putting devices around their<br />

community, how to attach those devices and where to put them.<br />

To that end the Commotion Project has put out the Commotion<br />

Construction Kit, 375 which is a full set of documentation that covers<br />

375 https://commotionwireless.net/docs/cck.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 151<br />

everything from how to talk to your neighbors, to how to mount a<br />

device, to how the software works.<br />

The goal there is that communities can build their capacity on their<br />

own to grow and maintain the network. The Construction Kit gives<br />

communities all the information they need to do that and it is available<br />

in English, French and Spanish. You can find the Construction Kit on<br />

our website, 376 where you can also get in touch with us if you have<br />

questions or [if you] possibly [want to] help us translate the kit into<br />

your local language.<br />

As far as hardware that is needed, it depends on the needs of<br />

the network and the community. For instance, if you are building<br />

a network that you’re hoping will stay in the community for a long<br />

period of time, it is advisable to get better quality hardware. By better<br />

I mean higher power radios and devices that are designed to do<br />

outdoor WiFi. These devices are less than USD 100 and are widely<br />

available.<br />

However, as I said earlier, our goal is to work with hardware that is<br />

already locally available. We are currently developing a software that<br />

can run on your laptop and turn your laptop into a commotion node<br />

– a device that can receive and pass traffic along the mesh network.<br />

Q4. What have been some of the main challenges that<br />

communities face when attempting to set up mesh networks?<br />

Is there free technical support available from your team at the<br />

Commotion Project?<br />

The challenges in general vary by location. For instance, in US cities<br />

like Brooklyn, there are technical challenges around how much radio<br />

signal is in your city because we are working with very weak radios,<br />

it’s very easy to have that signal crowded out by other signals. There<br />

are a lot of tall brick buildings in the neighborhood that block WiFi<br />

signals. However, there is nothing political that stands in the way of<br />

that mesh network.<br />

On the other hand, you can go to areas where there are no radios at<br />

all, and there you are not going to have technical problems, but you<br />

may have social problems that the community may need to deal with.<br />

In terms of technical support that we provide, we are trying to build<br />

a large community, with lots of people who can take questions.<br />

However, our development team is not big enough to support every<br />

commotion network in the world. We provide support as best as we<br />

can, but we can’t guarantee complete support. We like to answer<br />

questions and our goal is to train communities to support their<br />

mesh networks by themselves. As the project grows we’re trying<br />

to set up more training programs.<br />

DIGITAL SECURITY<br />

5<br />

376 https://commotionwireless.net.


152<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Sudanese civil society and its digital security<br />

challenges<br />

Abdel-Rahman El-Mahdi is a member of Sudanese civil society and<br />

the founder and executive manager of the Sudanese Development<br />

Initiative (SUDIA), 377 a non-profit organization specializing in good<br />

governance, youth empowerment and the advancement of civil<br />

society and the media.<br />

Abdel-Rahman talked to us about the challenges Sudanese civil<br />

society faces when it comes to protecting its privacy and digital<br />

security while using the internet and other modes of information<br />

and communication technologies (ICTs). This is especially relevant<br />

in the context of the current environment in Sudan where we have<br />

seen in the early months of 2015 yet another wave of attacks on<br />

civil society that included the mass confiscation of newspapers, as<br />

well as closures of civil society and cultural organizations such as<br />

the Sudanese Writers Union and the Mahmoud Mohammed Taha<br />

Cultural Center. 378<br />

Q1. What are the most felt challenges you believe the<br />

Sudanese independent civil society is facing when it comes<br />

to lack of diligence with their digital security, whether online<br />

or offline?<br />

Foremost is the lack and/or weakness of robust and well-developed<br />

systems within the institutions. Most civil society organizations<br />

are underdeveloped in terms of their internal governance and<br />

organizational systems and procedures. Digital security is but one of<br />

a myriad of internal measures that need to be developed and put in<br />

place, and if organizational health is the measure it is not necessarily<br />

the priority.<br />

Q2. Despite the heavy price that the lack of digital security<br />

procedures is resulting in for civil society, we are not yet<br />

seeing a visible change in behavior. Why is that, and what do<br />

you think is needed to create this necessary shift?<br />

I would tend to disagree that lack of digital security is exacting<br />

a heavy toll on civil society. The toll that might be exacted when<br />

organizations are closed and have their equipment confiscated is<br />

the loss of data or the organizational electronic records and files,<br />

and as far as I know, none of the organizations that have been<br />

closed down within the NGO sector have complained of that. The<br />

heavier toll, which these organizations suffer from, is the actual loss<br />

377 http://sudia.org/index.php/about-us.<br />

378 Almarsad Alsudani (Arabic blog). With Nearing Elections: More Closures,<br />

Confiscations and Limitations on the Work of Civil Society. February 9, 2015.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 153<br />

of their equipment and assets more so than the loss of their data.<br />

Data is oftentimes backed up and if not can be recovered from other<br />

sources.<br />

So, in my opinion, digital security is not seen as a priority and therefore<br />

one is less likely to see organizations changing their behavior. It is<br />

more a fad and only in a select number of cases considered a priority<br />

and integrated into the organizational systems and the daily behavior<br />

of organizational staff and their affiliates.<br />

I believe that Sudanese institutions/organizations are more a<br />

reflection of the culture/tradition. Sudanese have an oral tradition of<br />

communication. Information is conveyed and communicated orally<br />

rather than in writing or digitally, even within organizations. This has in<br />

general been a cause of the inability of our organizations to become<br />

sustainable and institutionalized. As such digital security becomes<br />

a concern only when the organization’s business (in all senses) is<br />

transacted digitally rather than verbally. Without a real effort of civil<br />

society organizations to institutionalize we are less likely to see an<br />

importance attached to digital security.<br />

Q3. Are there any examples of protecting privacy that come<br />

to mind from Sudan that reflect good practice from within<br />

organized elements, when using information communications<br />

technologies in general?<br />

I can only speak from our experience at SUDIA. We have increasingly<br />

begun to value digital security and efficiency. This is reflected in the<br />

use of applications such as Google Drive and all the applications<br />

that come with it. Documents are shared and worked on by staff in<br />

the cloud, where document owners prescribe the level of sharing<br />

and the person/s with whom they would like to share documents.<br />

Collaboration on projects is also increasingly being shifted from<br />

the real world to the virtual, where platforms such as Mavlink and<br />

Basecamp allow people to collaborate on projects virtually and<br />

without having to be in the same physical space. These platforms of<br />

collaboration not only contribute to greater digital security but they<br />

also help build an institutional memory in relation to projects and<br />

offer a source of learning and reflection.<br />

Q4. Any parting thoughts?<br />

Firstly, digital security, like other internal organizational systems,<br />

will only take root in organizations when organizations have<br />

reached a certain level of maturity, where they begin to recognize<br />

the need to develop their internal systems if they are to continue<br />

to flourish and grow. Secondly, the leadership or top management<br />

within organizations will need to have a genuine appreciation and<br />

recognition that digital security is needed and will contribute to the<br />

organization’s growth and sustainability. Finally, yet importantly,<br />

digital security is oftentimes about changing digital behavior and<br />

DIGITAL SECURITY<br />

5


154<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

norms, i.e. how we do things. That is the most difficult part. Making<br />

sure to log off your email account, frequently changing passwords,<br />

switching to using different programs and apps that one might not<br />

be used to, etc. Without perseverance and constant observation,<br />

even systems and policies that might be introduced might fail to<br />

bring about the required sustainable level of digital security within our<br />

civil society organizations.


Conclusion<br />

CONCLUSION


156<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Conclusion<br />

<strong>Social</strong> change is messy, complex, and often<br />

requires a timeframe of several generations, with<br />

the bulk of the work taking place offline – on the<br />

ground. Technology is therefore only one small<br />

ingredient in a complicated web of requirements.<br />

In oppressive environments especially, the important role of ICTs in<br />

amplifying marginalized voices, creating complex networks and allowing<br />

people, beyond the usual like-minded crowd, to connect and dialogue in<br />

relatively safer spaces, is likely to remain relevant in the foreseeable future.<br />

Every decade or so there are new innovations and trends in ICTs that<br />

change the fabric of human interaction. Therefore, technology itself is<br />

ephemeral, and what is more lasting is how individuals, organized groups<br />

or communities, whether loosely organized or institutionalized, use ICTs to<br />

peacefully address social justice challenges and to bring about peaceful<br />

social change. Hence, the focus of this guidebook has been on strategies,<br />

tactics and ICT-based tools that enable such social change to happen; as<br />

opposed to explaining how the technologies themselves work.<br />

One longer-term value this guidebook hopes to offer is through the in-depth<br />

interviews with a diverse array of experts and practitioners, and the case studies<br />

that provide a wealth of practical perspectives on how collective organized<br />

action that is using ICTs strategically and creatively (and often in oppressive<br />

and/or developmentally challenging environments), can lead to positive change.<br />

This guidebook, to some extent, also offers a focus on clarifying processes<br />

and workflow when using ICTs for organized campaigning, such as the<br />

sections on “How to Organize a <strong>Social</strong> <strong>Media</strong> Advocacy Campaign” or<br />

“How to Run a Successful Crowdfunding Campaign”. While capturing,<br />

documenting and improving upon processes and workflow may seem<br />

simple or natural for institutionalized civil society groups, a sizable amount<br />

of collective action today is taking place by citizens who are connecting and<br />

networking offline and online, without prior experience in campaigning or<br />

activism. And who are organizing horizontally and in a decentralized fashion<br />

and pouring a lot of effort into identifying processes that work for them –<br />

often having to start from scratch every single time and failing to document<br />

or keep a track record that others can build upon.<br />

The possibility of allowing civil society, as well as all citizens, to organize<br />

more strategically is an opportunity that calls for creating more robust,<br />

multilingual platforms that make such knowledge about easy-to-follow<br />

steps and successful digital campaigning tactics and case studies more<br />

readily available in an accessible, non-technical language. In this regard this<br />

guidebook only touched the surface.


<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 157<br />

Notes<br />

CONCLUSION


158<br />

<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />

Notes

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!